SlideShare a Scribd company logo
1 of 58
Contributions                 Network Controllability         Estimation over Random Networks   Conclusion




                        Networked Dynamic Systems:
                Identification, Controllability, and Randomness

                                          Marzieh Nabi-Abdolyousefi

                                               Aeronautics & Astronautics
                                                University of Washington




 Networked Dynamic Systems,                                                                      slide 1/58
Contributions                 Network Controllability         Estimation over Random Networks                 Conclusion




Networked Dynamic Systems (NDS)
                                         NDS
            a collection of dynamic systems that can measure or exchange
                          information via a connection graph


             multi-agent systems
             communication networks
             power networks
             social networks                            swarm of nano-satellites         underwater sensor networks




                      power networks                                        social networks

 Networked Dynamic Systems,                                                                                    slide 2/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




research objectives




                How to identify the underlying connection topology?
                How to efficiently interact with a network, e.g., a swarm?
                How to observe or control the behavior of a network?




 Networked Dynamic Systems,                                                                slide 3/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




Outline


       1    Contributions
              Network Identification
              Network Controllability
              Random Networks

       2    Network Controllability

       3    Coordinated Decentralized Estimation over Random Networks

       4    Conclusion




 Networked Dynamic Systems,                                                                slide 4/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




summary of contributions




                Network Identification

                Network Controllability

                System Properties of Random Networks




 Networked Dynamic Systems,                                                                slide 5/58
Contributions                                Network Controllability                   Estimation over Random Networks   Conclusion




  summary of contributions

                Network Identification: Inferring the topology of the network from
                a set of limited input-output data

                                     1
                                                                     Input signal
                                                                                    The underlying interconnection network is
Input signal


                    2
                                                            3
                                                                                    unknown
                                     4



                        5                               6
                                                                                    A set of input-output data while the
    Sensor

                                                                                    agents are running a consensus type
                            7                       9
         8
                                                                       10           protocol

               11                                               13                  Utilizing tools from system identification,
                                    12

                                                                                    graph theory, combinatorial theory, and
    Sensor
                                                                       Sensor       linear algebra
                                Input signal




    Networked Dynamic Systems,                                                                                              slide 6/58
Contributions                 Network Controllability            Estimation over Random Networks   Conclusion




summary of contributions
          Network Identification: node-knockout approach1

                                                          Knocking out individual nodes and any
 Node 3                                                   pair of nodes
Node 1
                                                          Knocking a node out involves the node
                                                          sending out a zero signal

                                                          Superimposition of these information via
  Node 2
                                                          generating functions

                                                          Fault detection ramification



            1
                IEEE Transactions on Automatic Control and CDC 2010
 Networked Dynamic Systems,                                                                         slide 7/58
Contributions                 Network Controllability          Estimation over Random Networks   Conclusion




summary of contributions

          Network Identification: sieve method2


 Node 3                                                   System identification provides the number
Node 1                                                    of edges and the number of adjacent
                                                          neighbors for a subset of agents

                                                          Integer partitioning
  Node 2

                                                          Degree based graph construction




            2
                IET Control Theory & Applications, 2012
 Networked Dynamic Systems,                                                                       slide 8/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




summary of contributions
       Network Identification: linear algebraic approach3



                                                            System identification provides a
                                                            similarity transportation of the
                                                            original system

                                                            Linear algebraic tools such as
                                                            householder reflection

                                                            Identify graphs isomorphic to the
                                                            original system
                     householder reflection

            3
                CDC 2012
 Networked Dynamic Systems,                                                                slide 9/58
Contributions                 Network Controllability             Estimation over Random Networks   Conclusion




summary of contributions

       Network Controllability: how to influence a network and derive the
       states of a network to any desired value




                 Controllability of circulant networks4

                 Controllability of composite networks5

            4
                IEEE Transactions on Automatic Control
            5
                IEEE Transactions on Automatic Control (submission proc.) and CDC 2012
 Networked Dynamic Systems,                                                                         slide 10/58
Contributions                      Network Controllability    Estimation over Random Networks   Conclusion




summary of contributions

       Network Controllability:
                                    5
                             6             4

                       7                         3



                 8                                    2




             9                                            1




                 10                                   16



                       11                        15

                             12            14
                                    13


                            Circulant networks                     Cartesian product networks

                      For an arbitrary n, there are

          2 n/2 undirected (unlabeled) circulants




 Networked Dynamic Systems,                                                                     slide 11/58
Contributions                 Network Controllability                Estimation over Random Networks                     Conclusion




summary of contributions

       System properties of random networks: Modeling large scale
       networks or interaction with a network with random distributions


                                                            Flying robotic swarms to create Wi-Fi cloudsa

                                                                 a
                                                                     Courtesy of Swiss Federal Institute of Technology




                 Observability/controllability
                 Optimality properties6
                 Coordinated decentralized estimation7
            6
                IEEE Transactions on Automatic Control (submission proc.) and CDC 2011
            7
                IEEE Transactions on Automatic Control (submission proc.) and ACC 2011
 Networked Dynamic Systems,                                                                                              slide 12/58
Contributions                  Network Controllability     Estimation over Random Networks                    Conclusion




summary of contributions

       System properties of random networks: application



                                                         Fifteen Florentine family graph to analyze the social control and
                                                         optimal marketing




                 Opinion dynamics and optimal marketing

                 Decentralized estimation of opinion dynamics8


            8
                submission proc.
 Networked Dynamic Systems,                                                                                    slide 13/58
Contributions                  Network Controllability             Estimation over Random Networks                 Conclusion




summary of contributions

       System properties of random networks: application

                 Online position estimation of the Seaglider9




                  Seaglider: autonomous underwater vehicle                         localization experiment


                Courtesy of Prof. Morgansen’s Nonlinear Dynamics and Control Lab at the University of Washington

            9
                submission proc.
 Networked Dynamic Systems,                                                                                        slide 14/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




Outline


       1    Contributions

       2    Network Controllability
              Circulant Networks and Applications
              Controllability of Circulant Networks
              Symmetry Structures

       3    Coordinated Decentralized Estimation over Random Networks

       4    Conclusion




 Networked Dynamic Systems,                                                               slide 15/58
Contributions                 Network Controllability               Estimation over Random Networks   Conclusion




How to interact with networks?




                                                        Courtesy of Nature




       The underlying network could be path networks, circulant
       networks, large scale networks, Cartesian product networks,
       random networks, and ...
 Networked Dynamic Systems,                                                                           slide 16/58
Contributions                   Network Controllability         Estimation over Random Networks   Conclusion




modeling

                                             x(t) = A(G)x(t) + Bu(t)
                                             ˙
                                             y(t) = Cx(t)
       where A(G) = −Lw (G) ∈ Rn×n is the weighted Laplacian.
                                                                                                    
                                                                       1         −1 0  0 0
                                                                     −1         3 −1 −1 0           
                                                                                                    
                                                           A(G) = −  0
                                                                                −1 3 −1 −1          ,
                                                                                                     
                        2                4
                                                                     0          −1 −1 3 −1          
                                                                       0         0 −1 −1 2
                                                                    
           1                3                                   1 0
                                                               0 1 
                                         5
                                                                                       1 0 0 0 0
                                                          B =  0 0 , C         =                        .
                                                              
                                                               0 0 
                                                                                        0 0 0 1 0
                                                                0 0
 Networked Dynamic Systems,                                                                       slide 17/58
Contributions                              Network Controllability                           Estimation over Random Networks                      Conclusion




                     Controllability is important and non-trivial

                     56
                                                                                                                          n = 2m : controllable from
                     54
                     52
                                                                                                                          any single nodea
                     50
                     48
                     46
                                                                                                                          n prime: controllable from
                     44
                     42
                                                                                                                          any single node except the
                     40
                     38                                                                                                   middle one
                     36

                                                                                                                          our contribution for general
controllable nodes




                     34
                     32
                     30
                     28                                                                                                   n: the node j is
                     26
                     24                                                                                                   uncontrollable if the following
                     22
                     20
                     18
                                                                                                                          happens
                     16
                     14                                                                                                            k(2j − 1)π
                     12                                                                                                      sin                  =0
                     10
                      8
                                                                                                                                       2n
                      6
                      4
                      2                                                                                                   for some k = 1, 2, . . . , n
                      0
                       2    4   6   8   10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56
                                                           number of nodes                                           a
                                                                                                                         G. Parlangeliand & G. N., IEEE Trans., 2012
                          Networked Dynamic Systems,                                                                                                                   slide 18/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




network topology and network controllability



                What features of a network topology determine the network
                controllability? maybe symmetry?

                Networks with known controllability properties

                         In literature: paths, cycles, and grids
                         Our contributions: circulant networks and composite networks




 Networked Dynamic Systems,                                                               slide 19/58
Contributions                 Network Controllability      Estimation over Random Networks   Conclusion




circulant networks

                      4
                                   3
                                                        The ith vertex is adjacent to a set of
         5                                              vertices on its right and the symmetric
                                             2          ones on its left
  6
                                                        For an arbitrary n, there are 2 n/2
                                                  1
                                                        undirected (unlabeled) circulant
  7
                                                        Known closed form eigenvectors
                                             11

         8
                                                        Appear in some engineered systems
                                   10
                      9




 Networked Dynamic Systems,                                                                  slide 20/58
Contributions                 Network Controllability    Estimation over Random Networks                    Conclusion




circulant networks and applications

                Coding theory, VLSI design
                quantum communication
                parallel and distributed computation

                                                               observer-based fault detection
                                                               consensus-based load balancing
                                                               distributed security protocols for
                                                               clock synchronization


                                                        Swiss-T1 cluster supercomputer with 64 processors




 Networked Dynamic Systems,                                                                                 slide 21/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




controllability of circulant networks: main result

       Theorem
       A circulant network of order n with maximum algebraic multiplicity
       q is controllable from q nodes. Moreover,

        (a) for n prime: the set of q nodes can be chosen arbitrarily, and

        (b) for general n: the indices of the q nodes, in a clockwise or
            counterclockwise indexing order, can be chosen as an
            arithmetic progression of length q with the common difference
            of 1.

       The theorem provides necessary and sufficient condition for the
       controllability of circulant networks
 Networked Dynamic Systems,                                                               slide 22/58
Contributions                 Network Controllability       Estimation over Random Networks   Conclusion




proof by contradiction
                From the PBH test, the pair (A, B) is not controllable if and
                only if there exists w = 0 and λ ∈ C such that

                                    wT A(G) = λwT             and         wT B = 0.

                For any choice of input matrix B, suppose ∃ w = 0 such that
                w = q αj vj = Qα, where
                       j=1

                       Q = v1 |v2 | . . . |vq           and α = α1 , α2 , . . . , αq

                PBH implies that

                                         wT B = αT (QT B) = 0,              α=0

                Therefore, det(QT B) = 0 ... utilizing Cauchy-Binet formula
                to calculate QT B
 Networked Dynamic Systems,                                                                   slide 23/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




summary of the proof




 Networked Dynamic Systems,                                                               slide 24/58
Contributions                 Network Controllability          Estimation over Random Networks   Conclusion




Cauchy-Binet formula
       Let us recall F and H to be, respectively, m × n and n × m
       matrices, with m ≤ n. Let [n] = {1, 2, . . . , n} and

            Γn = {m-element subsets of [n]} = {S ⊆ [n] : |S| = m}.
             m



       The Cauchy-Binet formula then states that

                          det(F H) =                    det(F[m],S ) det(HS,[m] ),
                                              S∈Γn
                                                 m



                S ∈ Γn
                     m
                F[m],S is the m × m submatrix of F with column indices in S
                HS,[m] is the m × m submatrix of H with row indices in S

 Networked Dynamic Systems,                                                                      slide 25/58
Contributions                 Network Controllability           Estimation over Random Networks            Conclusion




       Example: take m = 2 and n = 3 and
                                                    1 1 2
                                              F     =
                                                    3 1 −1
                                                       
                                                    1 1
                                              H =  3 1 
                                                    0 2

       Then, S ∈ Γ3 = {{1, 2}, {1, 3}, {2, 3}} and
                  2


                              1     1         1     1       1     2          3    1          1     2        1      1
       det(F H) =                         .             +                .             +               .
                              3     1         3     1       1    1−          0    2          3    −1        0      2




 Networked Dynamic Systems,                                                                                slide 26/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




blending Cauchy-Binet formula and PBH test



                Cauchy-Binet formula provides a formulation to calculate
                det(QT B)

                Therefore, more knowledge about the eigenvector structure of
                circulant networks is necessary

                The following slide recall the closed form eigenvectors of
                circulant networks




 Networked Dynamic Systems,                                                               slide 27/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




matrices associated to circulant networks


       Matrices associated to the circulant networks                   have circulant
       structure
                                                                           
                       c0     c1     c2 c3 . . .                       cn−1
                   
                    cn−1 c0                                             . 
                                                                         . 
                                    c1 c2                               . 
                                              ..                           
                    cn−2 cn−1 c0 c1              .
                                                                            ;
                                                                            
                    .
                   
                              ..     .. ..
                    .           .     .    .
                                                                            
                    .                                                  c2 
                                                                       c1 
                       c1           ...       cn−1                      c0

       in particular, a circulant matrix is Toeplitz


 Networked Dynamic Systems,                                                               slide 28/58
Contributions                 Network Controllability       Estimation over Random Networks           Conclusion




closed form eigen structure of circulant networks

       Theorem
       The eigenvalues and eigenvectors of a circulant network are,
       respectively,
                                     n−1
                     λm =                  ck e−2πimk/n ,
                                     k=0
                            1                                                                 T
                      vm = √ 1, e−2πim/n , . . . , e−2πim(n−1)/n                                  ,
                             n
                       m = 0, . . . , n − 1.




 Networked Dynamic Systems,                                                                           slide 29/58
Contributions                 Network Controllability   Estimation over Random Networks        Conclusion




matrix of eigenvectors

       The matrix of eigenvectors ...
                                                      0·(n−1)
                                                                                          
                           wn0·0      wn0·1   ...    wn
                            1·0        1·1            1·(n−1)                            
                   1  wn             wn      ...    wn                                   
            U=√             .          .     ..          .                               ,
                    n      .
                             .          .
                                        .         .       .
                                                          .
                                                                                          
                                                                                          
                           (n−1)·0    (n−1)·1        (n−1)·(n−1)
                         wn         wn        . . . wn

       where wn = e−2πi/n for m = 0, 1, . . . , n − 1

       The matrix U has Vandermonde structure




 Networked Dynamic Systems,                                                                    slide 30/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




Vandermonde matrices
       A Vandermonde matrix
                              2        n−1
                                                                       
                    1    α1 α1 . . . α1
                  1          2        n−1
                         α2 α2 . . . α2                                 
             V =                                                       ,      αi ∈ C;
                                                                       
                                ..
                  ... ...  ...     . ...                               
                            2          n−1
                    1 αn−1 αn−1 . . . αn−1


                it is well known that det V =              i=j (αi   − αj );

                so V is nonsingular if αi ’s are distinct

                A submatrix of Vandermonde matrix is referred to as
                generalized Vandermonde matrix


 Networked Dynamic Systems,                                                               slide 31/58
Contributions                 Network Controllability        Estimation over Random Networks   Conclusion




symmetry




                              Iranian classic architecture      Iranian classic architecture




                                Petronas twin towers                      nature
 Networked Dynamic Systems,                                                                    slide 32/58
Contributions                 Network Controllability     Estimation over Random Networks   Conclusion




input symmetry



                                                              Fix the input nodes

                                                              Permute the nodes such that the
                                                              neighboring set of each node
                                                              doesn’t alter

                                                        If there is such a permutation, the
                                                        system is called input symmetric

                      input nodes {1, 5}




 Networked Dynamic Systems,                                                                 slide 33/58
Contributions                 Network Controllability     Estimation over Random Networks              Conclusion




breaking symmetry and controllability

                               input symmetry =⇒ uncontrollability10




          input symmetric =⇒ uncontrollable from {1, 5}   controllability nodes {1, 8} =⇒ input asymmetry



           10
                A. Rahmani et al. SIAM, 2009
 Networked Dynamic Systems,                                                                            slide 34/58
Contributions                 Network Controllability     Estimation over Random Networks    Conclusion




breaking symmetry and controllability
                              uncontrollability =⇒ input symmetry ?

                                                        a counter example




                                                        Theorem
                                                        For a cycle network of prime order

                                                        uncontrollability ⇐⇒ input symmetry.



         cycle of order 7, uncontrollable from node 1

 Networked Dynamic Systems,                                                                  slide 35/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




symmetry and eigenvalue multiplicity



       The relation between the algebraic multiplicity of networks and
       network symmetry is essential


       Conjecture
       The circulant network is uncontrollable if and only if it is input
       symmetric.




 Networked Dynamic Systems,                                                               slide 36/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




Outline

       1    Contributions

       2    Network Controllability

       3    Coordinated Decentralized Estimation over Random Networks
              Motivation
              Problem Formulation
              Random Coordinated Estimation
              Online Position Estimation of Seaglider

       4    Conclusion




 Networked Dynamic Systems,                                                               slide 37/58
Contributions                 Network Controllability   Estimation over Random Networks        Conclusion




explore system/ graph theoretic aspect of deterministic/
stochastic systems that operate over a random network ...
why?
           Modeling                                           Introduced by design
           real systems are subjective to                             limited battery sources:
                   link failure                                              large sensor networks:
                   unreliable communication                                  sensing structural
                   limited bandwidth                                         integrity
                   delays                                                    habitat monitoring
                   data loss                                                 firebugs
                                                                      reactive sample rate: soil
                                                                      moisture monitoring




 Networked Dynamic Systems,                                                                    slide 38/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




example: road monitoring




 Networked Dynamic Systems,                                                               slide 39/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




                 how easy is it to control or observe a random networked
                 system via a small subset of nodes or edges chosen ran-
                 domly or deterministically?




                                                                                           t


 Networked Dynamic Systems,                                                               slide 40/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




examine coordinated decentralized estimator design over
networks in different scenarios involving randomness




       Both schemes have some notion of randomness and local
       computation in common ...


 Networked Dynamic Systems,                                                               slide 41/58
Contributions                 Network Controllability        Estimation over Random Networks   Conclusion




                 model the diffusion-like protocol
                                       x(t + 1) = At x(t) + Bt u(t)
                                              y(t) = Ct x(t),

       wt : the sequence of mutually independent random events

                G is a realization of the random graph

                At = A(G(wt )) is related to the diffusion-like protocol, e.g.,

                                                  A(G(wt )) = e−L(G(wt ))

                Bt = B(G(wt )): input matrix

                Ct = C(G(wt )): output matrix


 Networked Dynamic Systems,                                                                    slide 42/58
Contributions                 Network Controllability     Estimation over Random Networks   Conclusion




stochastic observability
       A stochastic system is said to be:

                Weakly state observable if for all x0 ∈ Rn and x ∈ Rn , and all
                 ∈ R+ , there exists a random time T a.s. finite such that

                                             P{||ˆ(T ; xo ) − x|| ≤ } > 0
                                                 x

                where x(T ; xo , u) denotes the estimation of x at time T .
                      ˆ

                State observable if this probability can be made equal to one.

                Strongly state observable if the hitting time
                TH = inf (t > 0; ||ˆ(t; xo ) − x|| ≤ ) has finite expectation
                                   x
                (E{TH } < +∞).


 Networked Dynamic Systems,                                                                 slide 43/58
Contributions                 Network Controllability          Estimation over Random Networks   Conclusion




observability Grammian over random networks
       Let
                                                        Rt = Ct Ct
       and consider the event

            Ωt = R1 + A1 R1 A1 + . . . + (At−1 . . . A1 )Rt (A2 . . . At−1 )
       the observed diffusion is weakly observable
                (Bougerol 1993) if for some t ≥ 1,

                                                    P{det(Ωt ) = 0} = 0

                or if and only if for some t ≥ 1,

                P{rank (Ct ; Ct−1 At , Ct−2 At At−1 , . . . , At . . . C1 A2 ) = n} = 0.


 Networked Dynamic Systems,                                                                      slide 44/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




decentralized estimation
       Theorem
       The estimation error x(t) − x(t) is almost surely asymptotically
                                   ˆ
       stable.
       or equivalently, there is a real number γ > 0, such that almost
       surely
                         1
                 lim       log ||(At − Kt Ct ), . . . , (A1 − K1 C1 )|| ≤ −γ
                t→∞      t
       for any solution of the random Riccati equation
       Proof.
           random Riccati map is contractive
                utilize a stochastic Lyapunov approach


 Networked Dynamic Systems,                                                               slide 45/58
Contributions                 Network Controllability      Estimation over Random Networks         Conclusion




online position estimation of Seaglider




                Seaglider: autonomous underwater vehicle              localization experiment




                       the experiment in Port Susan               Beacon-seaglider communication
 Networked Dynamic Systems,                                                                        slide 46/58
Contributions                 Network Controllability    Estimation over Random Networks   Conclusion




packet-drops

                                           1000
                                                                      Response
                                           900                        No Response
                                           800

                                           700

                                           600
                               Frequency




                                           500

                                           400

                                           300

                                           200

                                           100

                                             0
                                                  1      2                3
                                                        Node


       Approximately 50% of communications between the nodes and the
       sea-glider failed

 Networked Dynamic Systems,                                                                slide 47/58
Contributions                 Network Controllability         Estimation over Random Networks   Conclusion




the Seaglider dynamics


                                      x(t) = f (x(t), u(t)) + w(t)
                                      ˙
                                      y(t) = C(G(wt ))x(t) + v(t),

       where
                x = (xN , yE , ψ, Va , Vx , Vy )        w(t) ≈ N (0, Q) v(t) ≈ N (0, R)


       wt : the sequence of mutually independent random events
       G(wt ) is a realization of the random graph




 Networked Dynamic Systems,                                                                     slide 48/58
Contributions                 Network Controllability         Estimation over Random Networks   Conclusion




the Seaglider dynamics

                                                                                
                                                            Va cos ψ + Vx
                                                
                                                           Va sin ψ + Vy        
                                                                                 
                                                                 u              
                                     f (x, u) =                                 
                                                
                                                                  0             
                                                                                 
                                                                  0             
                                                                   0

                Va is the flow-relative speed of the glider,
                Vx and Vy are the North and East components of the current
                velocity vector, and
                ψ is the heading angle measured from North


 Networked Dynamic Systems,                                                                     slide 49/58
Contributions                    Network Controllability                       Estimation over Random Networks                         Conclusion




offline position estimation of the Seaglider
                                              Extended KF                                          Unscented KF
                         740                                                       740



                         720                                                       720



                         700                                                       700



                         680                                                       680
                    xN




                                                                              xN
                         660                                                       660



                         640                                                       640



                         620                                                       620



                         600                                                       600

                                              Off-line estimation                                      Off-line estimation
                         580                                                       580
                           -30    -20   -10       0         10      20   30          -30   -20   -10       0       10        20   30
                                                  yE                                                       yE

       L. Techy et al., UWAA Tech. Report 2010, ACC 2011
 Networked Dynamic Systems,                                                                                                            slide 50/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




the Seaglider estimation scheme




 Networked Dynamic Systems,                                                               slide 51/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




the Seaglider estimation scheme
                each sensor at its time slot measures the seaglider ’s position
                with probability pm
                each sensor at its time slot sends out its estimation to the
                coordinator with probability ps




                                    t1                                       t1 + 4

 Networked Dynamic Systems,                                                               slide 52/58
Contributions                  Network Controllability                      Estimation over Random Networks                        Conclusion




Seaglider distributed (online) estimation
                                              Extended KF                                           Unscented KF
                       760                                                      760


                       740                                                      740


                       720                                                      720


                       700                                                      700


                       680                                                      680
                  xN




                                                                           xN
                       660                                                      660


                       640                                                      640


                       620           On-line estimation                         620           On-line estimation
                                     Off-line estimation                                      Off-line estimation

                       600                                                      600


                       580                                                      580
                         -30   -20      -10       0         10   20   30          -30   -20      -10      0         10   20   30
                                                  yE                                                      yE

 Networked Dynamic Systems,                                                                                                        slide 53/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




Outline


       1    Contributions

       2    Network Controllability

       3    Coordinated Decentralized Estimation over Random Networks

       4    Conclusion




 Networked Dynamic Systems,                                                               slide 54/58
Contributions                 Network Controllability              Estimation over Random Networks                    Conclusion




Contributions
           1    M. Nabi-Abdolyousefi, A. Chapman, and Mehran Mesbahi, Controllability and observability of Cartesian
                product networks, IEEE Transaction on Automatic Control, submission proc..
            2   M. Nabi-Abdolyousefi and M. Mesbahi, Network identification via node knock-out, IEEE Transactions on
                Automatic Control, 2012.
            3   M. Nabi-Abdolyousefi and M. Mesbahi, On the Controllability Properties of Circulant Networks, IEEE
                Transactions on Automatic Control, accepted.
            4   M. Nabi-Abdolyousefi and M. Mesbahi. A sieve method for consensus-type network tomography, IET
                Control Theory & Applications, 2012.
            5   A. Chapman, M. Nabi-Abdolyousefi and M. Mesbahi, Identification and infiltration of consensus-type
                networks, 1st IFAC Workshop on Estimation and Control of Networked Systems, pp. 84–89, 2009.
            6   M. Nabi-Abdolyousefi and M. Mesbahi. Network identification via node knock-out, 49th IEEE Conference
                on Decision, Atlanta, GA, December 2010.
            7   M. Nabi-Abdolyousefi and M. Mesbahi, System Theory over Random Networks: Controllability and
                Optimality Properties, 50th IEEE Conference on Decision, Orlando, Fl, 2010.
            8   M. Nabi Abdolyousefi, M. Mesbahi, Decentralized estimators over random networks, American Control
                Conference, San Francisco, CA, 2011.
            9   M. Nabi, M. Mesbahi, N. Fathpour, F. Y. Hadaegh. Local estimators for multiple spacecraft formation
                flying. AIAA Guidance and Control, Fl, 2008.
           10 M. Nabi-Abdolyousefi, M. Fazel, and M. Mesbahi. Graph Identification via Transfer Matrices, Similarity
              Transformations, and Matrix Approximations, 51th IEEE Conference on Decision and Control, Maui, USA,
              2012.
           11 M. Nabi-Abdolyousefi, A. Chapman, and M. Mesbahi, Controllability and Observability of Cartesian
              Product Networks, 51th IEEE Conference on Decision and Control, Maui, USA, 2012.


 Networked Dynamic Systems,                                                                                           slide 55/58
Contributions                 Network Controllability            Estimation over Random Networks                  Conclusion




List of ongoing articles


           12   M. Nabi-Abdolyousefi, M. Mesbahi, Optimality properties of random networks, IEEE Transactions on
                Automatic Control.
           13 M. Nabi-Abdolyousefi, M. Mesbahi, Coordinated decentralized estimation over random networks, IEEE
              Transactions on Automatic Control.
           14 M. Nabi-Abdolyousefi, M. Mesbahi, Network controllability: A Survey
           15 M. Nabi-Abdolyousefi, M. Mesbahi, Opinion dynamics and optimal marketing.
           16 M. Nabi-Abdolyousefi, M. Mesbahi, Random decentralized estimation on opinion dynamics.
           17 M. Nabi-Abdolyousefi, L. Techy, M. Mesbahi, and K. Morgansen, Online position estimation of Seaglider,
              ICRA 2013.




 Networked Dynamic Systems,                                                                                       slide 56/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




Thank you




                Mehran Mesbahi
                Santosh Devasia
                Maryam Fazel Sarjoui
                Eric Klavins
                Kristi Morgansen




 Networked Dynamic Systems,                                                               slide 57/58
Contributions                 Network Controllability   Estimation over Random Networks   Conclusion




       And special thanks to Atiye Alaedini and DSSL group




 Networked Dynamic Systems,                                                               slide 58/58

More Related Content

What's hot

A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETA NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETIJNSA Journal
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
20080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture0320080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture03Computer Science Club
 
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...IRJET Journal
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Network processing by pid
Network processing by pidNetwork processing by pid
Network processing by pidNuno Martins
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...IOSR Journals
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 

What's hot (18)

Layered approach
Layered approachLayered approach
Layered approach
 
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETA NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor network
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
20080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture0320080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture03
 
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Network processing by pid
Network processing by pidNetwork processing by pid
Network processing by pid
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 

Viewers also liked

Pdf 1 presentacion 22-03-13 scdad eh-1
Pdf 1 presentacion 22-03-13 scdad eh-1Pdf 1 presentacion 22-03-13 scdad eh-1
Pdf 1 presentacion 22-03-13 scdad eh-1euskalemfyre
 
Struktur jantung dan peredaran darah dalam
Struktur jantung dan peredaran darah dalamStruktur jantung dan peredaran darah dalam
Struktur jantung dan peredaran darah dalamAsmira Aliens
 
Mohamed Samir Portfolio
Mohamed Samir PortfolioMohamed Samir Portfolio
Mohamed Samir Portfoliomohamed samir
 
Instagram. Фотооборот информации в бизнесе
Instagram. Фотооборот информации в бизнесеInstagram. Фотооборот информации в бизнесе
Instagram. Фотооборот информации в бизнесеСергей Полторак
 
愛的承諾Apo 2010年版com99080204
愛的承諾Apo 2010年版com99080204愛的承諾Apo 2010年版com99080204
愛的承諾Apo 2010年版com99080204惠燕 蔡
 
ใบงานที่ 4 เรื่อง โครงงานประเภท “การพัฒนาสื่อเพื่อการศึกษา”
ใบงานที่ 4 เรื่อง โครงงานประเภท “การพัฒนาสื่อเพื่อการศึกษา”ใบงานที่ 4 เรื่อง โครงงานประเภท “การพัฒนาสื่อเพื่อการศึกษา”
ใบงานที่ 4 เรื่อง โครงงานประเภท “การพัฒนาสื่อเพื่อการศึกษา”Net'Net Zii
 
Architect Mohamed samir portfolio
Architect Mohamed samir portfolioArchitect Mohamed samir portfolio
Architect Mohamed samir portfoliomohamed samir
 
Portfolio 2014 spring
Portfolio 2014 springPortfolio 2014 spring
Portfolio 2014 springDaniel Hollis
 
Butterfly
ButterflyButterfly
Butterflyvenuavs
 
President Abraham Lincoln's Bloodstained shirt Up For AUCTION!
President Abraham Lincoln's  Bloodstained shirt  Up For AUCTION!President Abraham Lincoln's  Bloodstained shirt  Up For AUCTION!
President Abraham Lincoln's Bloodstained shirt Up For AUCTION!Satans SideShow
 
Cube7 by BONOFA - Un grande BUSINESS per gli amanti dei Social Network
Cube7 by BONOFA - Un grande BUSINESS per gli amanti dei Social NetworkCube7 by BONOFA - Un grande BUSINESS per gli amanti dei Social Network
Cube7 by BONOFA - Un grande BUSINESS per gli amanti dei Social NetworkAndrea Principe
 
השעה הפרטנית
השעה הפרטנית   השעה הפרטנית
השעה הפרטנית Lea Patron
 
Making Infrastructure as Awesome as Agile Development
Making Infrastructure as Awesome as Agile DevelopmentMaking Infrastructure as Awesome as Agile Development
Making Infrastructure as Awesome as Agile Developmentmsilpala
 
P iv 8 - informática - actividades orientadoras de desempeños
P iv   8 - informática - actividades orientadoras de desempeñosP iv   8 - informática - actividades orientadoras de desempeños
P iv 8 - informática - actividades orientadoras de desempeñosmkciencias
 
Constructive Reasoning for Semantic Wikis - PhD defense presentation
Constructive Reasoning for Semantic Wikis - PhD defense presentationConstructive Reasoning for Semantic Wikis - PhD defense presentation
Constructive Reasoning for Semantic Wikis - PhD defense presentationJakub Kotowski
 
Reinventing strategies for emerging markets
Reinventing strategies for emerging marketsReinventing strategies for emerging markets
Reinventing strategies for emerging marketsBill Gunawan
 

Viewers also liked (20)

Marketing general
Marketing generalMarketing general
Marketing general
 
Pdf 1 presentacion 22-03-13 scdad eh-1
Pdf 1 presentacion 22-03-13 scdad eh-1Pdf 1 presentacion 22-03-13 scdad eh-1
Pdf 1 presentacion 22-03-13 scdad eh-1
 
Struktur jantung dan peredaran darah dalam
Struktur jantung dan peredaran darah dalamStruktur jantung dan peredaran darah dalam
Struktur jantung dan peredaran darah dalam
 
Mohamed Samir Portfolio
Mohamed Samir PortfolioMohamed Samir Portfolio
Mohamed Samir Portfolio
 
Instagram. Фотооборот информации в бизнесе
Instagram. Фотооборот информации в бизнесеInstagram. Фотооборот информации в бизнесе
Instagram. Фотооборот информации в бизнесе
 
愛的承諾Apo 2010年版com99080204
愛的承諾Apo 2010年版com99080204愛的承諾Apo 2010年版com99080204
愛的承諾Apo 2010年版com99080204
 
ใบงานที่ 4 เรื่อง โครงงานประเภท “การพัฒนาสื่อเพื่อการศึกษา”
ใบงานที่ 4 เรื่อง โครงงานประเภท “การพัฒนาสื่อเพื่อการศึกษา”ใบงานที่ 4 เรื่อง โครงงานประเภท “การพัฒนาสื่อเพื่อการศึกษา”
ใบงานที่ 4 เรื่อง โครงงานประเภท “การพัฒนาสื่อเพื่อการศึกษา”
 
Architect Mohamed samir portfolio
Architect Mohamed samir portfolioArchitect Mohamed samir portfolio
Architect Mohamed samir portfolio
 
Portfolio 2014 spring
Portfolio 2014 springPortfolio 2014 spring
Portfolio 2014 spring
 
Butterfly
ButterflyButterfly
Butterfly
 
A Friday @ Arlanet
A Friday @ ArlanetA Friday @ Arlanet
A Friday @ Arlanet
 
President Abraham Lincoln's Bloodstained shirt Up For AUCTION!
President Abraham Lincoln's  Bloodstained shirt  Up For AUCTION!President Abraham Lincoln's  Bloodstained shirt  Up For AUCTION!
President Abraham Lincoln's Bloodstained shirt Up For AUCTION!
 
Cube7 by BONOFA - Un grande BUSINESS per gli amanti dei Social Network
Cube7 by BONOFA - Un grande BUSINESS per gli amanti dei Social NetworkCube7 by BONOFA - Un grande BUSINESS per gli amanti dei Social Network
Cube7 by BONOFA - Un grande BUSINESS per gli amanti dei Social Network
 
השעה הפרטנית
השעה הפרטנית   השעה הפרטנית
השעה הפרטנית
 
Making Infrastructure as Awesome as Agile Development
Making Infrastructure as Awesome as Agile DevelopmentMaking Infrastructure as Awesome as Agile Development
Making Infrastructure as Awesome as Agile Development
 
ISEA Paper 2011
ISEA Paper 2011ISEA Paper 2011
ISEA Paper 2011
 
P iv 8 - informática - actividades orientadoras de desempeños
P iv   8 - informática - actividades orientadoras de desempeñosP iv   8 - informática - actividades orientadoras de desempeños
P iv 8 - informática - actividades orientadoras de desempeños
 
Constructive Reasoning for Semantic Wikis - PhD defense presentation
Constructive Reasoning for Semantic Wikis - PhD defense presentationConstructive Reasoning for Semantic Wikis - PhD defense presentation
Constructive Reasoning for Semantic Wikis - PhD defense presentation
 
Daniel
DanielDaniel
Daniel
 
Reinventing strategies for emerging markets
Reinventing strategies for emerging marketsReinventing strategies for emerging markets
Reinventing strategies for emerging markets
 

Similar to Networked Dynamic Systems: Identification, Controllability, and Randomness

Introduction to Networked Dynamical Systems with focus on Distributed Coordin...
Introduction to Networked Dynamical Systems with focus on Distributed Coordin...Introduction to Networked Dynamical Systems with focus on Distributed Coordin...
Introduction to Networked Dynamical Systems with focus on Distributed Coordin...Marzieh Nabi
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperJPINFOTECH JAYAPRAKASH
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...chennaijp
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackeSAT Publishing House
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networksantoniomorancardenas
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionSoft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionAlexander Decker
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Papitha Velumani
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012Muhammad Farhan
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...ieijjournal
 
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...IRJET Journal
 
A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...JPINFOTECH JAYAPRAKASH
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksEswar Publications
 

Similar to Networked Dynamic Systems: Identification, Controllability, and Randomness (20)

Introduction to Networked Dynamical Systems with focus on Distributed Coordin...
Introduction to Networked Dynamical Systems with focus on Distributed Coordin...Introduction to Networked Dynamical Systems with focus on Distributed Coordin...
Introduction to Networked Dynamical Systems with focus on Distributed Coordin...
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Ids presentation
Ids presentationIds presentation
Ids presentation
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionSoft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
 
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
 
M026075079
M026075079M026075079
M026075079
 
A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Networked Dynamic Systems: Identification, Controllability, and Randomness

  • 1. Contributions Network Controllability Estimation over Random Networks Conclusion Networked Dynamic Systems: Identification, Controllability, and Randomness Marzieh Nabi-Abdolyousefi Aeronautics & Astronautics University of Washington Networked Dynamic Systems, slide 1/58
  • 2. Contributions Network Controllability Estimation over Random Networks Conclusion Networked Dynamic Systems (NDS) NDS a collection of dynamic systems that can measure or exchange information via a connection graph multi-agent systems communication networks power networks social networks swarm of nano-satellites underwater sensor networks power networks social networks Networked Dynamic Systems, slide 2/58
  • 3. Contributions Network Controllability Estimation over Random Networks Conclusion research objectives How to identify the underlying connection topology? How to efficiently interact with a network, e.g., a swarm? How to observe or control the behavior of a network? Networked Dynamic Systems, slide 3/58
  • 4. Contributions Network Controllability Estimation over Random Networks Conclusion Outline 1 Contributions Network Identification Network Controllability Random Networks 2 Network Controllability 3 Coordinated Decentralized Estimation over Random Networks 4 Conclusion Networked Dynamic Systems, slide 4/58
  • 5. Contributions Network Controllability Estimation over Random Networks Conclusion summary of contributions Network Identification Network Controllability System Properties of Random Networks Networked Dynamic Systems, slide 5/58
  • 6. Contributions Network Controllability Estimation over Random Networks Conclusion summary of contributions Network Identification: Inferring the topology of the network from a set of limited input-output data 1 Input signal The underlying interconnection network is Input signal 2 3 unknown 4 5 6 A set of input-output data while the Sensor agents are running a consensus type 7 9 8 10 protocol 11 13 Utilizing tools from system identification, 12 graph theory, combinatorial theory, and Sensor Sensor linear algebra Input signal Networked Dynamic Systems, slide 6/58
  • 7. Contributions Network Controllability Estimation over Random Networks Conclusion summary of contributions Network Identification: node-knockout approach1 Knocking out individual nodes and any Node 3 pair of nodes Node 1 Knocking a node out involves the node sending out a zero signal Superimposition of these information via Node 2 generating functions Fault detection ramification 1 IEEE Transactions on Automatic Control and CDC 2010 Networked Dynamic Systems, slide 7/58
  • 8. Contributions Network Controllability Estimation over Random Networks Conclusion summary of contributions Network Identification: sieve method2 Node 3 System identification provides the number Node 1 of edges and the number of adjacent neighbors for a subset of agents Integer partitioning Node 2 Degree based graph construction 2 IET Control Theory & Applications, 2012 Networked Dynamic Systems, slide 8/58
  • 9. Contributions Network Controllability Estimation over Random Networks Conclusion summary of contributions Network Identification: linear algebraic approach3 System identification provides a similarity transportation of the original system Linear algebraic tools such as householder reflection Identify graphs isomorphic to the original system householder reflection 3 CDC 2012 Networked Dynamic Systems, slide 9/58
  • 10. Contributions Network Controllability Estimation over Random Networks Conclusion summary of contributions Network Controllability: how to influence a network and derive the states of a network to any desired value Controllability of circulant networks4 Controllability of composite networks5 4 IEEE Transactions on Automatic Control 5 IEEE Transactions on Automatic Control (submission proc.) and CDC 2012 Networked Dynamic Systems, slide 10/58
  • 11. Contributions Network Controllability Estimation over Random Networks Conclusion summary of contributions Network Controllability: 5 6 4 7 3 8 2 9 1 10 16 11 15 12 14 13 Circulant networks Cartesian product networks For an arbitrary n, there are 2 n/2 undirected (unlabeled) circulants Networked Dynamic Systems, slide 11/58
  • 12. Contributions Network Controllability Estimation over Random Networks Conclusion summary of contributions System properties of random networks: Modeling large scale networks or interaction with a network with random distributions Flying robotic swarms to create Wi-Fi cloudsa a Courtesy of Swiss Federal Institute of Technology Observability/controllability Optimality properties6 Coordinated decentralized estimation7 6 IEEE Transactions on Automatic Control (submission proc.) and CDC 2011 7 IEEE Transactions on Automatic Control (submission proc.) and ACC 2011 Networked Dynamic Systems, slide 12/58
  • 13. Contributions Network Controllability Estimation over Random Networks Conclusion summary of contributions System properties of random networks: application Fifteen Florentine family graph to analyze the social control and optimal marketing Opinion dynamics and optimal marketing Decentralized estimation of opinion dynamics8 8 submission proc. Networked Dynamic Systems, slide 13/58
  • 14. Contributions Network Controllability Estimation over Random Networks Conclusion summary of contributions System properties of random networks: application Online position estimation of the Seaglider9 Seaglider: autonomous underwater vehicle localization experiment Courtesy of Prof. Morgansen’s Nonlinear Dynamics and Control Lab at the University of Washington 9 submission proc. Networked Dynamic Systems, slide 14/58
  • 15. Contributions Network Controllability Estimation over Random Networks Conclusion Outline 1 Contributions 2 Network Controllability Circulant Networks and Applications Controllability of Circulant Networks Symmetry Structures 3 Coordinated Decentralized Estimation over Random Networks 4 Conclusion Networked Dynamic Systems, slide 15/58
  • 16. Contributions Network Controllability Estimation over Random Networks Conclusion How to interact with networks? Courtesy of Nature The underlying network could be path networks, circulant networks, large scale networks, Cartesian product networks, random networks, and ... Networked Dynamic Systems, slide 16/58
  • 17. Contributions Network Controllability Estimation over Random Networks Conclusion modeling x(t) = A(G)x(t) + Bu(t) ˙ y(t) = Cx(t) where A(G) = −Lw (G) ∈ Rn×n is the weighted Laplacian.   1 −1 0 0 0  −1 3 −1 −1 0    A(G) = −  0  −1 3 −1 −1 ,  2 4  0 −1 −1 3 −1  0 0 −1 −1 2   1 3 1 0  0 1  5   1 0 0 0 0 B =  0 0 , C = .   0 0   0 0 0 1 0 0 0 Networked Dynamic Systems, slide 17/58
  • 18. Contributions Network Controllability Estimation over Random Networks Conclusion Controllability is important and non-trivial 56 n = 2m : controllable from 54 52 any single nodea 50 48 46 n prime: controllable from 44 42 any single node except the 40 38 middle one 36 our contribution for general controllable nodes 34 32 30 28 n: the node j is 26 24 uncontrollable if the following 22 20 18 happens 16 14 k(2j − 1)π 12 sin =0 10 8 2n 6 4 2 for some k = 1, 2, . . . , n 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 number of nodes a G. Parlangeliand & G. N., IEEE Trans., 2012 Networked Dynamic Systems, slide 18/58
  • 19. Contributions Network Controllability Estimation over Random Networks Conclusion network topology and network controllability What features of a network topology determine the network controllability? maybe symmetry? Networks with known controllability properties In literature: paths, cycles, and grids Our contributions: circulant networks and composite networks Networked Dynamic Systems, slide 19/58
  • 20. Contributions Network Controllability Estimation over Random Networks Conclusion circulant networks 4 3 The ith vertex is adjacent to a set of 5 vertices on its right and the symmetric 2 ones on its left 6 For an arbitrary n, there are 2 n/2 1 undirected (unlabeled) circulant 7 Known closed form eigenvectors 11 8 Appear in some engineered systems 10 9 Networked Dynamic Systems, slide 20/58
  • 21. Contributions Network Controllability Estimation over Random Networks Conclusion circulant networks and applications Coding theory, VLSI design quantum communication parallel and distributed computation observer-based fault detection consensus-based load balancing distributed security protocols for clock synchronization Swiss-T1 cluster supercomputer with 64 processors Networked Dynamic Systems, slide 21/58
  • 22. Contributions Network Controllability Estimation over Random Networks Conclusion controllability of circulant networks: main result Theorem A circulant network of order n with maximum algebraic multiplicity q is controllable from q nodes. Moreover, (a) for n prime: the set of q nodes can be chosen arbitrarily, and (b) for general n: the indices of the q nodes, in a clockwise or counterclockwise indexing order, can be chosen as an arithmetic progression of length q with the common difference of 1. The theorem provides necessary and sufficient condition for the controllability of circulant networks Networked Dynamic Systems, slide 22/58
  • 23. Contributions Network Controllability Estimation over Random Networks Conclusion proof by contradiction From the PBH test, the pair (A, B) is not controllable if and only if there exists w = 0 and λ ∈ C such that wT A(G) = λwT and wT B = 0. For any choice of input matrix B, suppose ∃ w = 0 such that w = q αj vj = Qα, where j=1 Q = v1 |v2 | . . . |vq and α = α1 , α2 , . . . , αq PBH implies that wT B = αT (QT B) = 0, α=0 Therefore, det(QT B) = 0 ... utilizing Cauchy-Binet formula to calculate QT B Networked Dynamic Systems, slide 23/58
  • 24. Contributions Network Controllability Estimation over Random Networks Conclusion summary of the proof Networked Dynamic Systems, slide 24/58
  • 25. Contributions Network Controllability Estimation over Random Networks Conclusion Cauchy-Binet formula Let us recall F and H to be, respectively, m × n and n × m matrices, with m ≤ n. Let [n] = {1, 2, . . . , n} and Γn = {m-element subsets of [n]} = {S ⊆ [n] : |S| = m}. m The Cauchy-Binet formula then states that det(F H) = det(F[m],S ) det(HS,[m] ), S∈Γn m S ∈ Γn m F[m],S is the m × m submatrix of F with column indices in S HS,[m] is the m × m submatrix of H with row indices in S Networked Dynamic Systems, slide 25/58
  • 26. Contributions Network Controllability Estimation over Random Networks Conclusion Example: take m = 2 and n = 3 and 1 1 2 F = 3 1 −1   1 1 H =  3 1  0 2 Then, S ∈ Γ3 = {{1, 2}, {1, 3}, {2, 3}} and 2 1 1 1 1 1 2 3 1 1 2 1 1 det(F H) = . + . + . 3 1 3 1 1 1− 0 2 3 −1 0 2 Networked Dynamic Systems, slide 26/58
  • 27. Contributions Network Controllability Estimation over Random Networks Conclusion blending Cauchy-Binet formula and PBH test Cauchy-Binet formula provides a formulation to calculate det(QT B) Therefore, more knowledge about the eigenvector structure of circulant networks is necessary The following slide recall the closed form eigenvectors of circulant networks Networked Dynamic Systems, slide 27/58
  • 28. Contributions Network Controllability Estimation over Random Networks Conclusion matrices associated to circulant networks Matrices associated to the circulant networks have circulant structure   c0 c1 c2 c3 . . . cn−1   cn−1 c0 .  .   c1 c2 .   ..   cn−2 cn−1 c0 c1 . ;   .  .. .. ..  . . . .   . c2   c1  c1 ... cn−1 c0 in particular, a circulant matrix is Toeplitz Networked Dynamic Systems, slide 28/58
  • 29. Contributions Network Controllability Estimation over Random Networks Conclusion closed form eigen structure of circulant networks Theorem The eigenvalues and eigenvectors of a circulant network are, respectively, n−1 λm = ck e−2πimk/n , k=0 1 T vm = √ 1, e−2πim/n , . . . , e−2πim(n−1)/n , n m = 0, . . . , n − 1. Networked Dynamic Systems, slide 29/58
  • 30. Contributions Network Controllability Estimation over Random Networks Conclusion matrix of eigenvectors The matrix of eigenvectors ...  0·(n−1)  wn0·0 wn0·1 ... wn  1·0 1·1 1·(n−1)  1  wn wn ... wn  U=√  . . .. . , n . . . . . . .   (n−1)·0 (n−1)·1 (n−1)·(n−1) wn wn . . . wn where wn = e−2πi/n for m = 0, 1, . . . , n − 1 The matrix U has Vandermonde structure Networked Dynamic Systems, slide 30/58
  • 31. Contributions Network Controllability Estimation over Random Networks Conclusion Vandermonde matrices A Vandermonde matrix 2 n−1   1 α1 α1 . . . α1  1 2 n−1 α2 α2 . . . α2  V = , αi ∈ C;   ..  ... ... ... . ...  2 n−1 1 αn−1 αn−1 . . . αn−1 it is well known that det V = i=j (αi − αj ); so V is nonsingular if αi ’s are distinct A submatrix of Vandermonde matrix is referred to as generalized Vandermonde matrix Networked Dynamic Systems, slide 31/58
  • 32. Contributions Network Controllability Estimation over Random Networks Conclusion symmetry Iranian classic architecture Iranian classic architecture Petronas twin towers nature Networked Dynamic Systems, slide 32/58
  • 33. Contributions Network Controllability Estimation over Random Networks Conclusion input symmetry Fix the input nodes Permute the nodes such that the neighboring set of each node doesn’t alter If there is such a permutation, the system is called input symmetric input nodes {1, 5} Networked Dynamic Systems, slide 33/58
  • 34. Contributions Network Controllability Estimation over Random Networks Conclusion breaking symmetry and controllability input symmetry =⇒ uncontrollability10 input symmetric =⇒ uncontrollable from {1, 5} controllability nodes {1, 8} =⇒ input asymmetry 10 A. Rahmani et al. SIAM, 2009 Networked Dynamic Systems, slide 34/58
  • 35. Contributions Network Controllability Estimation over Random Networks Conclusion breaking symmetry and controllability uncontrollability =⇒ input symmetry ? a counter example Theorem For a cycle network of prime order uncontrollability ⇐⇒ input symmetry. cycle of order 7, uncontrollable from node 1 Networked Dynamic Systems, slide 35/58
  • 36. Contributions Network Controllability Estimation over Random Networks Conclusion symmetry and eigenvalue multiplicity The relation between the algebraic multiplicity of networks and network symmetry is essential Conjecture The circulant network is uncontrollable if and only if it is input symmetric. Networked Dynamic Systems, slide 36/58
  • 37. Contributions Network Controllability Estimation over Random Networks Conclusion Outline 1 Contributions 2 Network Controllability 3 Coordinated Decentralized Estimation over Random Networks Motivation Problem Formulation Random Coordinated Estimation Online Position Estimation of Seaglider 4 Conclusion Networked Dynamic Systems, slide 37/58
  • 38. Contributions Network Controllability Estimation over Random Networks Conclusion explore system/ graph theoretic aspect of deterministic/ stochastic systems that operate over a random network ... why? Modeling Introduced by design real systems are subjective to limited battery sources: link failure large sensor networks: unreliable communication sensing structural limited bandwidth integrity delays habitat monitoring data loss firebugs reactive sample rate: soil moisture monitoring Networked Dynamic Systems, slide 38/58
  • 39. Contributions Network Controllability Estimation over Random Networks Conclusion example: road monitoring Networked Dynamic Systems, slide 39/58
  • 40. Contributions Network Controllability Estimation over Random Networks Conclusion how easy is it to control or observe a random networked system via a small subset of nodes or edges chosen ran- domly or deterministically? t Networked Dynamic Systems, slide 40/58
  • 41. Contributions Network Controllability Estimation over Random Networks Conclusion examine coordinated decentralized estimator design over networks in different scenarios involving randomness Both schemes have some notion of randomness and local computation in common ... Networked Dynamic Systems, slide 41/58
  • 42. Contributions Network Controllability Estimation over Random Networks Conclusion model the diffusion-like protocol x(t + 1) = At x(t) + Bt u(t) y(t) = Ct x(t), wt : the sequence of mutually independent random events G is a realization of the random graph At = A(G(wt )) is related to the diffusion-like protocol, e.g., A(G(wt )) = e−L(G(wt )) Bt = B(G(wt )): input matrix Ct = C(G(wt )): output matrix Networked Dynamic Systems, slide 42/58
  • 43. Contributions Network Controllability Estimation over Random Networks Conclusion stochastic observability A stochastic system is said to be: Weakly state observable if for all x0 ∈ Rn and x ∈ Rn , and all ∈ R+ , there exists a random time T a.s. finite such that P{||ˆ(T ; xo ) − x|| ≤ } > 0 x where x(T ; xo , u) denotes the estimation of x at time T . ˆ State observable if this probability can be made equal to one. Strongly state observable if the hitting time TH = inf (t > 0; ||ˆ(t; xo ) − x|| ≤ ) has finite expectation x (E{TH } < +∞). Networked Dynamic Systems, slide 43/58
  • 44. Contributions Network Controllability Estimation over Random Networks Conclusion observability Grammian over random networks Let Rt = Ct Ct and consider the event Ωt = R1 + A1 R1 A1 + . . . + (At−1 . . . A1 )Rt (A2 . . . At−1 ) the observed diffusion is weakly observable (Bougerol 1993) if for some t ≥ 1, P{det(Ωt ) = 0} = 0 or if and only if for some t ≥ 1, P{rank (Ct ; Ct−1 At , Ct−2 At At−1 , . . . , At . . . C1 A2 ) = n} = 0. Networked Dynamic Systems, slide 44/58
  • 45. Contributions Network Controllability Estimation over Random Networks Conclusion decentralized estimation Theorem The estimation error x(t) − x(t) is almost surely asymptotically ˆ stable. or equivalently, there is a real number γ > 0, such that almost surely 1 lim log ||(At − Kt Ct ), . . . , (A1 − K1 C1 )|| ≤ −γ t→∞ t for any solution of the random Riccati equation Proof. random Riccati map is contractive utilize a stochastic Lyapunov approach Networked Dynamic Systems, slide 45/58
  • 46. Contributions Network Controllability Estimation over Random Networks Conclusion online position estimation of Seaglider Seaglider: autonomous underwater vehicle localization experiment the experiment in Port Susan Beacon-seaglider communication Networked Dynamic Systems, slide 46/58
  • 47. Contributions Network Controllability Estimation over Random Networks Conclusion packet-drops 1000 Response 900 No Response 800 700 600 Frequency 500 400 300 200 100 0 1 2 3 Node Approximately 50% of communications between the nodes and the sea-glider failed Networked Dynamic Systems, slide 47/58
  • 48. Contributions Network Controllability Estimation over Random Networks Conclusion the Seaglider dynamics x(t) = f (x(t), u(t)) + w(t) ˙ y(t) = C(G(wt ))x(t) + v(t), where x = (xN , yE , ψ, Va , Vx , Vy ) w(t) ≈ N (0, Q) v(t) ≈ N (0, R) wt : the sequence of mutually independent random events G(wt ) is a realization of the random graph Networked Dynamic Systems, slide 48/58
  • 49. Contributions Network Controllability Estimation over Random Networks Conclusion the Seaglider dynamics   Va cos ψ + Vx   Va sin ψ + Vy    u  f (x, u) =     0    0  0 Va is the flow-relative speed of the glider, Vx and Vy are the North and East components of the current velocity vector, and ψ is the heading angle measured from North Networked Dynamic Systems, slide 49/58
  • 50. Contributions Network Controllability Estimation over Random Networks Conclusion offline position estimation of the Seaglider Extended KF Unscented KF 740 740 720 720 700 700 680 680 xN xN 660 660 640 640 620 620 600 600 Off-line estimation Off-line estimation 580 580 -30 -20 -10 0 10 20 30 -30 -20 -10 0 10 20 30 yE yE L. Techy et al., UWAA Tech. Report 2010, ACC 2011 Networked Dynamic Systems, slide 50/58
  • 51. Contributions Network Controllability Estimation over Random Networks Conclusion the Seaglider estimation scheme Networked Dynamic Systems, slide 51/58
  • 52. Contributions Network Controllability Estimation over Random Networks Conclusion the Seaglider estimation scheme each sensor at its time slot measures the seaglider ’s position with probability pm each sensor at its time slot sends out its estimation to the coordinator with probability ps t1 t1 + 4 Networked Dynamic Systems, slide 52/58
  • 53. Contributions Network Controllability Estimation over Random Networks Conclusion Seaglider distributed (online) estimation Extended KF Unscented KF 760 760 740 740 720 720 700 700 680 680 xN xN 660 660 640 640 620 On-line estimation 620 On-line estimation Off-line estimation Off-line estimation 600 600 580 580 -30 -20 -10 0 10 20 30 -30 -20 -10 0 10 20 30 yE yE Networked Dynamic Systems, slide 53/58
  • 54. Contributions Network Controllability Estimation over Random Networks Conclusion Outline 1 Contributions 2 Network Controllability 3 Coordinated Decentralized Estimation over Random Networks 4 Conclusion Networked Dynamic Systems, slide 54/58
  • 55. Contributions Network Controllability Estimation over Random Networks Conclusion Contributions 1 M. Nabi-Abdolyousefi, A. Chapman, and Mehran Mesbahi, Controllability and observability of Cartesian product networks, IEEE Transaction on Automatic Control, submission proc.. 2 M. Nabi-Abdolyousefi and M. Mesbahi, Network identification via node knock-out, IEEE Transactions on Automatic Control, 2012. 3 M. Nabi-Abdolyousefi and M. Mesbahi, On the Controllability Properties of Circulant Networks, IEEE Transactions on Automatic Control, accepted. 4 M. Nabi-Abdolyousefi and M. Mesbahi. A sieve method for consensus-type network tomography, IET Control Theory & Applications, 2012. 5 A. Chapman, M. Nabi-Abdolyousefi and M. Mesbahi, Identification and infiltration of consensus-type networks, 1st IFAC Workshop on Estimation and Control of Networked Systems, pp. 84–89, 2009. 6 M. Nabi-Abdolyousefi and M. Mesbahi. Network identification via node knock-out, 49th IEEE Conference on Decision, Atlanta, GA, December 2010. 7 M. Nabi-Abdolyousefi and M. Mesbahi, System Theory over Random Networks: Controllability and Optimality Properties, 50th IEEE Conference on Decision, Orlando, Fl, 2010. 8 M. Nabi Abdolyousefi, M. Mesbahi, Decentralized estimators over random networks, American Control Conference, San Francisco, CA, 2011. 9 M. Nabi, M. Mesbahi, N. Fathpour, F. Y. Hadaegh. Local estimators for multiple spacecraft formation flying. AIAA Guidance and Control, Fl, 2008. 10 M. Nabi-Abdolyousefi, M. Fazel, and M. Mesbahi. Graph Identification via Transfer Matrices, Similarity Transformations, and Matrix Approximations, 51th IEEE Conference on Decision and Control, Maui, USA, 2012. 11 M. Nabi-Abdolyousefi, A. Chapman, and M. Mesbahi, Controllability and Observability of Cartesian Product Networks, 51th IEEE Conference on Decision and Control, Maui, USA, 2012. Networked Dynamic Systems, slide 55/58
  • 56. Contributions Network Controllability Estimation over Random Networks Conclusion List of ongoing articles 12 M. Nabi-Abdolyousefi, M. Mesbahi, Optimality properties of random networks, IEEE Transactions on Automatic Control. 13 M. Nabi-Abdolyousefi, M. Mesbahi, Coordinated decentralized estimation over random networks, IEEE Transactions on Automatic Control. 14 M. Nabi-Abdolyousefi, M. Mesbahi, Network controllability: A Survey 15 M. Nabi-Abdolyousefi, M. Mesbahi, Opinion dynamics and optimal marketing. 16 M. Nabi-Abdolyousefi, M. Mesbahi, Random decentralized estimation on opinion dynamics. 17 M. Nabi-Abdolyousefi, L. Techy, M. Mesbahi, and K. Morgansen, Online position estimation of Seaglider, ICRA 2013. Networked Dynamic Systems, slide 56/58
  • 57. Contributions Network Controllability Estimation over Random Networks Conclusion Thank you Mehran Mesbahi Santosh Devasia Maryam Fazel Sarjoui Eric Klavins Kristi Morgansen Networked Dynamic Systems, slide 57/58
  • 58. Contributions Network Controllability Estimation over Random Networks Conclusion And special thanks to Atiye Alaedini and DSSL group Networked Dynamic Systems, slide 58/58