Hierarchical Analysis and Control of Epidemic Spreading over Networks using Dissipativity and Mesh Stability

Shirantha Welikala and Hai Lin and Panos J. Antsaklis The support of the National Science Foundation (Grant No. CNS-1830335, IIS-2007949) is gratefully acknowledged.Shirantha Welikala is with the Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ swelikal@stevens.edu. Hai Lin and Panos J. Antsaklis are with the Department of Electrical Engineering, University of Notre Dame, Notre Dame, IN {hlin1,pantsaklis}@nd.edu.
Abstract

Analyzing and controlling spreading processes are challenging problems due to the involved non-linear node (subsystem) dynamics, unknown disturbances, complex interconnections, and the large-scale and multi-level nature of the problems. The dissipativity concept provides a practical framework for addressing such concerns, thanks to the energy-based representation it offers for subsystems and the compositional properties it provides for the analysis and control of interconnected (networked) systems comprised of such subsystems. Therefore, in this paper, we utilize the dissipativity concept to analyze and control a spreading process that occurs over a hierarchy of nodes, groups, and a network (i.e., a spreading network). We start by generalizing some existing results on dissipativity-based topology design for networked systems. Next, we model the considered spreading network as a networked system and establish the dissipativity properties of its nodes. The generalized topology design method is then applied at multiple levels of the considered spreading network to formulate its analysis and control problems as Linear Matrix Inequality (LMI) problems. We identify and enforce localized necessary conditions to support the feasibility of the LMI problem solved at each subsequent hierarchical level of the spreading network. Consequently, the proposed method does not involve iterative multi-level optimization stages that are computationally inefficient. The proposed control solution ensures that the spreading network is not only stable but also dissipative and mesh-stable (i.e., it also minimizes the impact and propagation of disturbances affecting the spreading network). Compared to conventional methods, such as threshold pruning and high-degree edge removal, our approach offers superior performance in terms of infection containment, control efficiency, and disturbance robustness. Extensive numerical results demonstrate the effectiveness of the proposed technique.

Index TermsDissipativity-Based Control, Spreading Processes, Epidemics Control, Spreading Networks Design.

I Introduction

Studying epidemic spreading processes over interconnected systems is crucial for multiple domains, including epidemiology, social services, and healthcare systems. In terms of underlying dynamics, the spreading processes of information and opinions that occur in computer networks and social systems also take a very similar form. Therefore, understanding how infections propagate across multiple groups in a network–due to nodes in those groups having some inter-group interconnections–is crucial for designing effective control mechanisms to prevent undesirable outbreaks by preventing such interactions. Typically, these systems are modeled as graphs where nodes represent entities (e.g., individuals, households, communities, etc.), and edges denote interactions through which the spreading process occurs. Recent research has highlighted the importance of modeling such processes in a hierarchical manner, particularly when dealing with large-scale multi-level networks such as local, regional, and global spread of epidemics [??]. However, designing control strategies for these networks is challenging due to the presence of nonlinear node dynamics, unknown disturbances, complex interconnections, and their inherently large-scale multi-level nature.

Traditional control techniques for spreading networks generally focus on modifying the network topology to mitigate infection levels or enhance robustness. Some work also investigate acceleration of local healing (recovery) rates. Two commonly employed methods are threshold pruning and high-degree edge removal. Threshold pruning aims to eliminate inter-group connections exceeding a specified threshold, thus removing the most impactful pathways for infection spread. High-degree edge removal, on the other hand, targets nodes with high inter-group connectivity and eliminates their outgoing connections, thereby limiting the influence of highly connected nodes [??]. Despite their practical appeal, these methods are typically heuristic and fail to adequately account for the complex dynamics and external disturbances present in real-world systems. Additionally, such approaches are often static and do not offer guarantees regarding the stability or robustness of the network under varying conditions.

Dissipativity theory provides a powerful alternative framework for analyzing and controlling networked systems. Unlike conventional methods that rely on heuristic pruning strategies, dissipativity offers a systematic approach to evaluating the energy transfer properties of systems, which can be directly related to stability and robustness criteria. By using an energy-based representation of subsystems, dissipativity theory facilitates a compositional approach to the analysis and design of large-scale systems. It has been successfully applied to various networked control problems, including consensus, synchronization, and disturbance rejection [??]. However, its application to epidemic spreading control remains largely unexplored. In this paper, we propose a dissipativity-based framework for the analysis and design of spreading networks. Our approach models the spreading network as a hierarchical system with disturbance inputs and performance outputs, enabling the use of robust networked systems techniques in a scalable manner. The proposed method provides stability and robustness guarantees through dissipativity conditions formulated as Linear Matrix Inequality (LMI) problems, allowing for efficient computation and practical implementation.

Our contributions can be summarized as follows.

  1. 1.

    We model epidemic spreading processes as hierarchical networked systems with disturbance inputs and performance outputs, enabling the application of robust networked systems techniques in a scalable manner.

  2. 2.

    We derive dissipativity properties of the nodes under disturbances in epidemic spreading processes, enabling the analysis of dissipativity of any group of such nodes and, subsequently, of any network of such groups and beyond.

  3. 3.

    Going beyond the analysis of spreading networks, we propose a systematic spreading network design technique (to ensure stability and robustness via dissipativity) with soft and hard constraints on deviations from a given nominal interconnection network.

  4. 4.

    The proposed approach does not involve solving iterative multi-level optimization problems as we include specifically designed necessary conditions to support the feasibility of the optimization problem solved in each subsequent layer. All optimization problems take the form of LMI problems, hence convex, and can be solved using existing software toolboxes.

  5. 5.

    While we propose a very generalized approach, we provide clear implementation details and extensive numerical results showcasing the benefits of the proposed method and comparing it with basic spreading network control methods.

This paper is structured as follows. Section II provides necessary preliminary results on dissipativity and networked systems. Section III presents the spreading network dynamics and formulates the analysis and control (design) problems. The proposed dissipativity-based analysis and control techniques are detailed in Section IV. Simulation results and conclusions are given in Sections V and VI, respectively.

II Preliminaries

In this section, we provide some preliminary results that will be utilized in the remainder of this paper.

II-A Notations

We use \mathbb{R} and \mathbb{N} to denote sets of real and natural numbers, respectively. For any NN\in\mathbb{N}, we define N{1,2,..,N}\mathbb{N}_{N}\triangleq\{1,2,..,N\}. An n×mn\times m block matrix AA is denoted as A=[Aij]in,jmA=[A_{ij}]_{i\in\mathbb{N}_{n},j\in\mathbb{N}_{m}} or as A=[Aij]in,jmA=[A^{ij}]_{i\in\mathbb{N}_{n},j\in\mathbb{N}_{m}}). We consider [Aij]jm[A_{ij}]_{j\in\mathbb{N}_{m}} and diag([Aii]in)\text{diag}([A_{ii}]_{i\in\mathbb{N}_{n}}) to be a block row matrix and a block diagonal matrix, respectively. 𝟎\mathbf{0} and 𝐈\mathbf{I} respectively denote zero and identity matrices (their dimensions will be clear from the context). A symmetric positive definite (semi-definite) matrix An×nA\in\mathbb{R}^{n\times n} is denoted by A>0(A0)A>0\ (A\geq 0). We use the symbol \star to represent conjugate matrices in symmetric matrices (their meaning will be clear from the context). We also define (A)A+A\mathcal{H}(A)\triangleq A+A^{\top}, 𝟏{}\mathbf{1}_{\{\cdot\}} as the indicator function and eij𝟏{i=j}\mathrm{e}_{ij}\triangleq\mathbf{1}_{\{i=j\}}. The notations 𝒦\mathcal{K}_{\infty} and 𝒦\mathcal{KL} denote respective class-𝒦\mathcal{K} functions [1]. We use |||\cdot| to denote the Euclidean (spectral) norm of a vector (matrix), and \|\cdot\| to denote any standard norm (note ||=2|\cdot|=\|\cdot\|_{2}). For a time-varying vector (i.e., a signal) x{x(t)n}t0x\triangleq\{x(t)\in\mathbb{R}^{n}\}_{t\geq 0}, 2\mathcal{L}_{2} and \mathcal{L}_{\infty} norms are given by x0|x(t)|2𝑑t\|x\|\triangleq\sqrt{\int_{0}^{\infty}|x(t)|^{2}dt} and xsupt0|x(t)|\|x\|_{\infty}\triangleq\sup_{t\geq 0}|x(t)|, respectively. λ¯()\overline{\lambda}(\cdot), λ¯()\underline{\lambda}(\cdot) denotes the maximum and minimum eigenvalues of a matrix.

II-B Dissipativity

Consider the non-linear dynamical system described by

x˙(t)=f(x(t),u(t)),\displaystyle\dot{x}(t)=f(x(t),u(t)), (1)
y(t)=h(x(t),u(t)),\displaystyle y(t)=h(x(t),u(t)),

where x(t)nx(t)\in\mathbb{R}^{n}, u(t)lu(t)\in\mathbb{R}^{l} and y(t)my(t)\in\mathbb{R}^{m} denote the state, input and output, respectively. Functions f:n×lnf:\mathbb{R}^{n}\times\mathbb{R}^{l}\rightarrow\mathbb{R}^{n} and h:n×qmh:\mathbb{R}^{n}\times\mathbb{R}^{q}\rightarrow\mathbb{R}^{m} are continuously differentiable, and satisfy f(𝟎,𝟎)=𝟎f(\mathbf{0},\mathbf{0})=\mathbf{0} and h(𝟎,𝟎)=𝟎h(\mathbf{0},\mathbf{0})=\mathbf{0}.

Definition 1

The system (1) is called dissipative under supply rate s:l×ms:\mathbb{R}^{l}\times\mathbb{R}^{m}\rightarrow\mathbb{R} if there is a continuously differentiable storage function V:nV:\mathbb{R}^{n}\rightarrow\mathbb{R} such that V(x)>0V(x)>0 when x0x\neq 0, V(0)=0V(0)=0, and

V˙(x)=xV(x)f(x,u)s(u,y)\dot{V}(x)=\nabla_{x}V(x)f(x,u)\leq s(u,y),

for all trajectories (x,u)n×q(x,u)\in\mathbb{R}^{n}\times\mathbb{R}^{q} of the system.

Based on the used supply rate s(.,.)s(.,.), the dissipativity property can be specialized. The XX-dissipativity property (also known as (Q,S,R)(Q,S,R)-dissipativity in the literature), defined in the sequel, uses a quadratic supply rate determined by a coefficient matrix X=X[Xkl]k,l2l+mX=X^{\top}\triangleq[X^{kl}]_{k,l\in\mathbb{N}_{2}}\in\mathbb{R}^{l+m} [2].

Definition 2

The system (1) is XX-dissipative if it is dissipative under the quadratic supply rate function:

s(u,y)[uy][X11X12X21X22][uy].s(u,y)\triangleq\begin{bmatrix}u\\ y\end{bmatrix}^{\top}\begin{bmatrix}X^{11}&X^{12}\\ X^{21}&X^{22}\end{bmatrix}\begin{bmatrix}u\\ y\end{bmatrix}.

The notion of XX-dissipativity captures several well-known properties of interest [3], as outlined in the following remark.

Remark 1

If the system (1) is XX-dissipative with:

  1. 1.

    X=[𝟎12𝐈12𝐈𝟎]X=\scriptsize\begin{bmatrix}\mathbf{0}&\frac{1}{2}\mathbf{I}\\ \frac{1}{2}\mathbf{I}&\mathbf{0}\end{bmatrix}\normalsize, then it is passive;

  2. 2.

    X=[ν𝐈12𝐈12𝐈ρ𝐈]X=\scriptsize\begin{bmatrix}-\nu\mathbf{I}&\frac{1}{2}\mathbf{I}\\ \frac{1}{2}\mathbf{I}&-\rho\mathbf{I}\end{bmatrix}\normalsize, then it is strictly passive (ν\nu and ρ\rho are the input and output passivity indices, denoted as IF-OFP(ν,ρ\nu,\rho));

  3. 3.

    X=[γ2𝐈𝟎𝟎𝐈]X=\scriptsize\begin{bmatrix}\gamma^{2}\mathbf{I}&\mathbf{0}\\ \mathbf{0}&-\mathbf{I}\end{bmatrix}\normalsize, then it is L2L_{2}-stable (γ\gamma is the L2L_{2}-gain, denoted as L2G(γ)L2G(\gamma)).

II-C Node Dissipativity

Consider a scalar dynamic system Σs:u(t)y(t)\Sigma_{s}:u(t)\rightarrow y(t) described by (for known and fixed γ¯,δ>0\bar{\gamma},\delta>0):

x˙(t)=\displaystyle\dot{x}(t)= γ(t)x(t)+(1x(t))u(t)\displaystyle\ -\gamma(t)x(t)+(1-x(t))u(t) (2)
y(t)=\displaystyle y(t)= x(t)\displaystyle\ x(t)

where |γ(t)γ¯|δ|\gamma(t)-\bar{\gamma}|\leq\delta, x(t)[0,1]x(t)\in[0,1] and u(t)0u(t)\in\mathbb{R}_{\geq 0}.

Proposition 1

The system Σs\Sigma_{s} (2) is XX-dissipative for any X=X[abbc]2×2X=X^{\top}\triangleq\scriptsize\begin{bmatrix}a&b\\ b&c\end{bmatrix}\in\mathbb{R}^{2\times 2} that satisfies the LMI problem:

Find: p,a,b,c,\displaystyle\mbox{Find: }\ p,\ a,\ b,\ c,\ (3)
Sub. to: p>0,\displaystyle\mbox{Sub. to: }\ p>0,
{a0,(2bp)0,(c+p(γ¯δ))0,ora>0,b0,[abbc+p(γ¯δ)]0.\displaystyle
Proof:

Note that, in this proof, we omit denoting the dependence on time tt of variables x,u,γx,u,\gamma and yy for notational convenience. As x=0x=0 is an equilibrium point of Σs\Sigma_{s} (with u=0u=0 and y=0y=0), we consider a quadratic storage function V(x)V(x) and a quadratic supply rate function s(u,y)s(u,y) defined as V(x) = 12 p x^2   and  s(u,y) = [u y]^⊤[a bb c] [u y], respectively, where p>0p\in\mathbb{R}_{>0} and a,b,ca,b,c\in\mathbb{R} are design variables. For XX-dissipativity of the system Σs\Sigma_{s}, we require ˙V(x) ≤s(u,y) ⇔0 ≤Φ(u,x) ≜s(u,x) - ˙V(x) to hold for all possible trajectories of the system. Using V˙(x)=pxx˙\dot{V}(x)=px\dot{x} with (2), Φ(u,x)\Phi(u,x) can be expressed as

Φ(u,x)=\displaystyle\Phi(u,x)= au2+((2bp)+px)xu+(c+pγ)x2.\displaystyle\ au^{2}+((2b-p)+px)xu+(c+p\gamma)x^{2}.

Since γγ¯δ\gamma\geq\bar{\gamma}-\delta, we get Φ(u,x)Φ¯(u,x)\Phi(u,x)\geq\bar{\Phi}(u,x) where ¯Φ(u,x) ≜au^2 + ((2b-p) + px)xu + (c + p(¯γ-δ))x^2. Therefore, we need to identify the conditions to ensure Φ¯(u,x)0,x[0,1],u0\bar{\Phi}(u,x)\geq 0,\forall x\in[0,1],u\geq 0.

To this end, note that Φ¯(0,0)=0\bar{\Phi}(0,0)=0, Φ¯(0,x)=(c+p(γ¯δ))x2\bar{\Phi}(0,x)=(c+p(\bar{\gamma}-\delta))x^{2} and Φ¯(u,0)=au2\bar{\Phi}(u,0)=au^{2}. Therefore, it is clear that we require a0a\geq 0 and (c+p(γ¯δ))0(c+p(\bar{\gamma}-\delta))\geq 0. Now, let us define Ψ_x(u) ≜¯Φ(u,x) ≡au^2 + ¯bu + ¯c, where a0a\geq 0, b¯((2bp)+px)x\bar{b}\triangleq((2b-p)+px)x, and c¯(c+p(γ¯δ))x20\bar{c}\triangleq(c+p(\bar{\gamma}-\delta))x^{2}\geq 0.

First, let us consider the case a>0a>0, for which Ψx(u)\Psi_{x}(u) is a convex quadratic function in uu for a given x[0,1]x\in[0,1]. Let uu^{*} be the unconstrained minimizer of Ψx(u)\Psi_{x}(u) for a given x[0,1]x\in[0,1]. Using the convexity and Ψx(u)u=0\frac{\partial\Psi_{x}(u)}{\partial u}=0, we get u^* = -¯b2a  and  Ψ_x(u^*) = -¯b24a + ¯c. Note that, if u0u^{*}\leq 0, the convexity of Ψx(u)\Psi_{x}(u) and Ψx(0)0\Psi_{x}(0)\geq 0 automatically implies that Ψx(u)0,u0\Psi_{x}(u)\geq 0,\forall u\geq 0. On the other hand, if u0u^{*}\geq 0, we then require enforcing Ψx(u)0\Psi_{x}(u^{*})\geq 0 to guarantee Ψx(u)0,u0\Psi_{x}(u)\geq 0,\forall u\geq 0. Using the uu^{*} and Ψx(u)\Psi_{x}(u^{*}) expressions, these requirements translate to: If a>0a>0, then b¯0\bar{b}\geq 0, or b¯0\bar{b}\leq 0 and 4ac¯b¯204a\bar{c}-\bar{b}^{2}\geq 0. Finally, for the case a=0a=0, Ψx(u)=b¯u+c¯\Psi_{x}(u)=\bar{b}u+\bar{c} with c¯0\bar{c}\geq 0. Therefore, if a=0a=0, we require b¯0\bar{b}\geq 0 to ensure Ψx(u)0,u0\Psi_{x}(u)\geq 0,\forall u\geq 0. In all, we require c¯0\bar{c}\geq 0 and {a≥0, ¯b≥0,   or a¿0,¯b≤0,4a¯c-¯b2≥0.

Recall that b¯=((2bp)+px)x=px2+(2bp)x\bar{b}=((2b-p)+px)x=px^{2}+(2b-p)x, p>0p>0 and x[0,1]x\in[0,1]. Therefore, b¯0(2bp)0\bar{b}\geq 0\iff(2b-p)\geq 0, and b¯0b0\bar{b}\leq 0\iff b\leq 0. Further,

4ac¯b¯2=\displaystyle 4a\bar{c}-\bar{b}^{2}= 4a(c+p(γ¯δ))x2((2bp)+px)2x20\displaystyle\ 4a(c+p(\bar{\gamma}-\delta))x^{2}-((2b-p)+px)^{2}x^{2}\geq 0
4a(c+p(γ¯δ))((2bp)+px)20\displaystyle\iff 4a(c+p(\bar{\gamma}-\delta))-((2b-p)+px)^{2}\geq 0
a(c+p(γ¯δ))b20.\displaystyle\iff a(c+p(\bar{\gamma}-\delta))-b^{2}\geq 0.

Furthermore,

c¯=(c+p(γ¯δ))x20(c+p(γ¯δ))0.\displaystyle\bar{c}=(c+p(\bar{\gamma}-\delta))x^{2}\geq 0\iff(c+p(\bar{\gamma}-\delta))\geq 0.

Using these equivalences, we can arrive at the requirements as (c+p(γ¯δ))0(c+p(\bar{\gamma}-\delta))\geq 0 and

{a0,(2bp)0,ora>0,b0,a(c+p(γ¯δ))b20,\begin{cases}a\geq 0,(2b-p)\geq 0,\quad\mbox{or}\\ a>0,b\leq 0,a(c+p(\bar{\gamma}-\delta))-b^{2}\geq 0,\end{cases}

which leads to (3) using the Schur complement. ∎

Based on Prop. 1 and Rm. 1, the following corollary can be established regarding the passivity of the system Σs\Sigma_{s} (2).

Corollary 1

The system Σs\Sigma_{s} (2) with γ¯δ0\bar{\gamma}-\delta\geq 0 is passive, and also IF-OFP(ν,ρ\nu,\rho) with ν0,ρp(γ¯δ)\nu\leq 0,\rho\leq p(\bar{\gamma}-\delta) and p1p\leq 1.

Proof:

The proof follows directly from applying Prop. 1 for the first two XX-dissipativity cases given in Rm. 1. ∎

II-D Networked System Dissipativity

Consider a networked system Σ:wz\Sigma:w\rightarrow z as shown in Fig. 1 comprised of NN subsystems {Σi:iN}\{\Sigma_{i}:i\in\mathbb{N}_{N}\} with an input wqw\in\mathbb{R}^{q} (disturbance) and an output zrz\in\mathbb{R}^{r} (performance). Each subsystem Σi:uiyi,iN\Sigma_{i}:u_{i}\rightarrow y_{i},i\in\mathbb{N}_{N} follows the dynamics

x˙i(t)=\displaystyle\dot{x}_{i}(t)= fi(xi(t),ui(t)),\displaystyle\ f_{i}(x_{i}(t),u_{i}(t)), (4)
yi(t)=\displaystyle y_{i}(t)= gi(xi(t),ui(t)),\displaystyle\ g_{i}(x_{i}(t),u_{i}(t)),

where xi(t)nix_{i}(t)\in\mathbb{R}^{n_{i}}, ui(t)liu_{i}(t)\in\mathbb{R}^{l_{i}} and yi(t)miy_{i}(t)\in\mathbb{R}^{m_{i}} denotes the state, input and output, respectively, and fi(𝟎,𝟎)=𝟎f_{i}(\mathbf{0},\mathbf{0})=\mathbf{0} and hi(𝟎,𝟎)=𝟎h_{i}(\mathbf{0},\mathbf{0})=\mathbf{0}. The subsystems are interconnected according to the relationship

[u(t)z(t)]=M[y(t)w(t)]=[MuyMuwMzyMzw][y(t)w(t)],\begin{bmatrix}u(t)\\ z(t)\end{bmatrix}=M\begin{bmatrix}y(t)\\ w(t)\end{bmatrix}=\begin{bmatrix}M_{uy}&M_{uw}\\ M_{zy}&M_{zw}\end{bmatrix}\begin{bmatrix}y(t)\\ w(t)\end{bmatrix}, (5)

where u(t)=[ui(t)]iNlu(t)=[u_{i}^{\top}(t)]_{i\in\mathbb{N}_{N}}^{\top}\in\mathbb{R}^{l} and y(t)=[yi(t)]iNmy(t)=[y_{i}^{\top}(t)]_{i\in\mathbb{N}_{N}}^{\top}\in\mathbb{R}^{m} are vectorized subsystem inputs and outputs, respectively, and M(l+r)×(m+q)M\in\mathbb{R}^{(l+r)\times(m+q)} the interconnection matrix.

Refer to caption
Figure 1: Networked System

In the context of this paper, we require the following simplifying assumption regarding the dissipativity properties of the subsystems.

Assumption 1

Each subsystem Σi,iN\Sigma_{i},\ i\in\mathbb{N}_{N} (4) is XiX_{i}-dissipative (from input ui(t)u_{i}(t) to output yi(t)y_{i}(t)) where Xi=Xi=[Xikl]k,l2X_{i}=X_{i}^{\top}=[X_{i}^{kl}]_{k,l\in\mathbb{N}_{2}} is such that Xi11>0X_{i}^{11}>0.

In the following proposition, subsystem dissipativity properties {Xi:iN}\{X_{i}:i\in\mathbb{N}_{N}\} are used to design the interconnection matrix MM so that the networked system is dissipative.

Proposition 2

Under As. 1, the networked system Σ\Sigma shown in Fig. 1 can be made 𝒳\mathcal{X}-dissipative (from input w(t)w(t) to output z(t)z(t), where 𝒳=𝒳=[𝒳kl]k,l2\mathcal{X}=\mathcal{X}^{\top}=[\mathcal{X}^{kl}]_{k,l\in\mathbb{N}_{2}} with 𝒳22<0\mathcal{X}^{22}<0), by designing the interconnection matrix MM via the LMI problem

Find: Luy,Luw,Mzy,Mzw,{pi:iN}\displaystyle L_{uy},L_{uw},M_{zy},M_{zw},\{p_{i}:i\in\mathbb{N}_{N}\} (6)
Sub. to: pi>0,iN,Ψ>0\displaystyle p_{i}>0,\ \forall i\in\mathbb{N}_{N},\ \Psi>0

where Ψ\Psi is as defined in (7), Xpkldiag([piXikl]iN)\textbf{X}_{p}^{kl}\triangleq diag([p_{i}X_{i}^{kl}]_{i\in\mathbb{N}_{N}}) for any k,l2k,l\in\mathbb{N}_{2}, X12diag([(Xi11)1Xi12]iN)\textbf{X}^{12}\triangleq diag([(X_{i}^{11})^{-1}X_{i}^{12}]_{i\in\mathbb{N}_{N}}), X21(X12)\textbf{X}^{21}\triangleq(\textbf{X}^{12})^{\top} with Muy(Xp11)1LuyM_{uy}\triangleq(\textbf{X}_{p}^{11})^{-1}L_{uy} and Muw(Xp11)1LuwM_{uw}\triangleq(\textbf{X}_{p}^{11})^{-1}L_{uw}.

 

Ψ[Xp110LuyLuw0𝒳22𝒳22Mzy𝒳22MzwLuyMzy𝒳22LuyX12X21LuyXp22X21Luw+Mzy𝒳21LuwMzw𝒳22LuwX12+𝒳12MzyMzw𝒳21+𝒳12Mzw+𝒳11]\Psi\triangleq\begin{bmatrix}\textbf{X}_{p}^{11}&\textbf{0}&L_{uy}&L_{uw}\\ \textbf{0}&-\mathcal{X}^{22}&-\mathcal{X}^{22}M_{zy}&-\mathcal{X}^{22}M_{zw}\\ L_{uy}^{\top}&-M_{zy}^{\top}\mathcal{X}^{22}&-L_{uy}^{\top}\textbf{X}^{12}-\textbf{X}^{21}L_{uy}-\textbf{X}_{p}^{22}&-\textbf{X}^{21}L_{uw}+M_{zy}^{\top}\mathcal{X}^{21}\\ L_{uw}^{\top}&-M_{zw}^{\top}\mathcal{X}^{22}&-L_{uw}^{\top}\textbf{X}^{12}+\mathcal{X}^{12}M_{zy}&M_{zw}^{\top}\mathcal{X}^{21}+\mathcal{X}^{12}M_{zw}+\mathcal{X}^{11}\end{bmatrix} (7)
Φ[Xp110LuyXp110𝒳22𝒳22𝟎Luy𝒳22LuyX12X21LuyXp22Xp21+𝒳21Xp11𝟎Xp12+𝒳12𝒳11]\Phi\triangleq\begin{bmatrix}\textbf{X}_{p}^{11}&\textbf{0}&L_{uy}&\textbf{X}_{p}^{11}\\ \textbf{0}&-\mathcal{X}^{22}&-\mathcal{X}^{22}&\mathbf{0}\\ L_{uy}^{\top}&-\mathcal{X}^{22}&-L_{uy}^{\top}\textbf{X}^{12}-\textbf{X}^{21}L_{uy}-\textbf{X}_{p}^{22}&-\textbf{X}_{p}^{21}+\mathcal{X}^{21}\\ \textbf{X}_{p}^{11}&\mathbf{0}&-\textbf{X}_{p}^{12}+\mathcal{X}^{12}&\mathcal{X}^{11}\end{bmatrix} (8)

If the interconnection matrix MM is constrained so that

Muw𝐈,Mzy𝐈,Mzw𝟎,M_{uw}\triangleq\mathbf{I},\quad M_{zy}\triangleq\mathbf{I},\quad M_{zw}\triangleq\mathbf{0}, (9)

the following corollary can be used to design the remaining interconnection matrix block MuyM_{uy} so that the networked system is dissipative.

Corollary 2

Under As. 1 and constraints (9), the networked system Σ\Sigma shown in Fig. 1 can be made 𝒳\mathcal{X}-dissipative (from input w(t)w(t) to output z(t)z(t), where 𝒳=𝒳=[𝒳kl]k,l2\mathcal{X}=\mathcal{X}^{\top}=[\mathcal{X}^{kl}]_{k,l\in\mathbb{N}_{2}} with 𝒳22<0\mathcal{X}^{22}<0), by designing the interconnection matrix MM via the LMI problem

Find: Luy,{pi:iN}\displaystyle L_{uy},\{p_{i}:i\in\mathbb{N}_{N}\} (10)
Sub. to: pi>0,iN,Φ>0\displaystyle p_{i}>0,\ \forall i\in\mathbb{N}_{N},\ \Phi>0

where Φ\Phi is as defined in (8), and Muy(Xp11)1LuyM_{uy}\triangleq(\textbf{X}_{p}^{11})^{-1}L_{uy}.

Proof:

As Muw(Xp11)1LuwM_{uw}\triangleq(\textbf{X}_{p}^{11})^{-1}L_{uw} and Muw𝐈M_{uw}\triangleq\mathbf{I}, we get Luw=Xp11L_{uw}=\textbf{X}_{p}^{11}. Note also that X12(Xp11)1Xp12\textbf{X}^{12}\triangleq(\textbf{X}_{p}^{11})^{-1}\textbf{X}_{p}^{12}, and thus, Xp11X12=Xp12\textbf{X}_{p}^{11}\textbf{X}^{12}=\textbf{X}_{p}^{12}. Similarly, X21Xp11=Xp21\textbf{X}^{21}\textbf{X}_{p}^{11}=\textbf{X}_{p}^{21}. Applying these results together with (9) in (6), we can obtain (10). ∎

II-E Subsystem Dissipativity

Note that the feasibility of the network-level LMI problem presented in Prop. 2 (or Co. 2) depends on the used subsystem dissipativity properties {Xi:iN}\{X_{i}:i\in\mathbb{N}_{N}\}. Often, such subsystem dissipativity properties result from subsystem-level LMI problems. Therefore, it is worth identifying any necessary conditions required of subsystem dissipativity properties to help the feasibility of the network-level LMI problem, as they can be enforced at such subsystem-level LMI problems. In the following proposition, we identify such necessary conditions to help the feasibility of the network-level LMI problem (10) given in Co. 2 for the possible inclusion in subsystem-level LMI problems.

Proposition 3

For the feasibility of the network-level LMI problem (10) given in Co. 2, it is necessary that each subsystem Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} is XiX_{i}-dissipative such that XiX_{i} satisfies the LMI problem:

Find: Xi,{𝒳¯iikl:k,l2},\displaystyle\ X_{i},\{\bar{\mathcal{X}}_{ii}^{kl}:k,l\in\mathbb{N}_{2}\}, (11)
Sub. to: Φ~ii>0\displaystyle\ \tilde{\Phi}_{ii}>0

where Φ~ii\tilde{\Phi}_{ii} is as defined in (12), each 𝒳¯iikl\bar{\mathcal{X}}_{ii}^{kl} is a free variable matrix with the format of the iith diagonal block of 𝒳kl\mathcal{X}^{kl} in (6), and MuyiiM_{uy}^{ii} is the ii-th diagonal block of MuyM_{uy} that describes the self-connection matrix of the subsystem Σi,iN\Sigma_{i},i\in\mathbb{N}_{N}.

Proof:

For the block matrix Φ=[Φkl]k,l4\Phi=[\Phi_{kl}]_{k,l\in\mathbb{N}_{4}} given in (8), the equivalence Φ¿ 0 ⇔¯Φ ≜[[Φ_kl^ij]_k,l∈N_4]_i,j∈N_N ¿ 0 holds, where Φ¯\bar{\Phi} is the “block element-wise” permutation [4] of Φ\Phi. Using the diagonal blocks of Φ¯\bar{\Phi}, we can identify a set of necessary conditions for Φ>0\Phi>0 as Φ¿ 0 ⇔¯Φ ¿ 0 ⟹{ ¯Φ_ii ¿ 0, ∀i∈N_N}, where each Φ¯ii[Φklii]k,l4\bar{\Phi}_{ii}\triangleq[\Phi_{kl}^{ii}]_{k,l\in\mathbb{N}_{4}} takes the form in (13). Note that, the implication M_uy = (X_p^11)^-1 L_uy ⟹M_uy^ii = p_i^-1(X_i^11)^-1L_uy^ii, ∀i∈N_N, has also been used to replace LuyiiL_{uy}^{ii} terms in deriving (13). Finally, we use the equivalence ¯Φ_ii ¿ 0 ⇔~Φ_ii ≜1pi¯Φ_ii ¿ 0, and the notation 𝒳¯iikl1pi𝒳iikl,k,l2\bar{\mathcal{X}}^{kl}_{ii}\triangleq\frac{1}{p_{i}}\mathcal{X}^{kl}_{ii},\forall k,l\in\mathbb{N}_{2} divide the matrix Φ¯ii\bar{\Phi}_{ii} in (13) by pip_{i} to obtain (12). ∎

Φ~ii[Xi110Xi11MuyiiXi110𝒳¯ii22𝒳¯ii22𝟎(Muyii)Xi11𝒳¯ii22(Muyii)Xi12Xi21MuyiiXi22Xi21+𝒳¯ii21Xi11𝟎Xi12+𝒳¯ii12𝒳¯ii11]\tilde{\Phi}_{ii}\triangleq\begin{bmatrix}X_{i}^{11}&\textbf{0}&X_{i}^{11}M_{uy}^{ii}&X_{i}^{11}\\ \textbf{0}&-\bar{\mathcal{X}}^{22}_{ii}&-\bar{\mathcal{X}}^{22}_{ii}&\mathbf{0}\\ (M_{uy}^{ii})^{\top}X_{i}^{11}&-\bar{\mathcal{X}}^{22}_{ii}&-(M_{uy}^{ii})^{\top}X_{i}^{12}-X_{i}^{21}M_{uy}^{ii}-X_{i}^{22}&-X_{i}^{21}+\bar{\mathcal{X}}^{21}_{ii}\\ X_{i}^{11}&\mathbf{0}&-X_{i}^{12}+\bar{\mathcal{X}}^{12}_{ii}&\bar{\mathcal{X}}^{11}_{ii}\end{bmatrix} (12)
Φ¯ii[piXi110piXi11MuyiipiXi110𝒳ii22𝒳ii22𝟎pi(Muyii)Xi11𝒳ii22pi(Muyii)Xi12piXi21MuyiipiXi22piXi21+𝒳ii21piXi11𝟎piXi12+𝒳ii12𝒳ii11]\bar{\Phi}_{ii}\triangleq\begin{bmatrix}p_{i}X_{i}^{11}&\textbf{0}&p_{i}X_{i}^{11}M_{uy}^{ii}&p_{i}X_{i}^{11}\\ \textbf{0}&-\mathcal{X}^{22}_{ii}&-\mathcal{X}^{22}_{ii}&\mathbf{0}\\ p_{i}(M_{uy}^{ii})^{\top}X_{i}^{11}&-\mathcal{X}^{22}_{ii}&-p_{i}(M_{uy}^{ii})^{\top}X_{i}^{12}-p_{i}X_{i}^{21}M_{uy}^{ii}-p_{i}X_{i}^{22}&-p_{i}X_{i}^{21}+\mathcal{X}^{21}_{ii}\\ p_{i}X_{i}^{11}&\mathbf{0}&-p_{i}X_{i}^{12}+\mathcal{X}^{12}_{ii}&\mathcal{X}^{11}_{ii}\end{bmatrix} (13)
Remark 2

To include the identified necessary condition (11) in the subsystem-level LMI problem solved at the subsystem Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} (to find its dissipativity XiX_{i}), it is required to know the self-connection matrix MuyiiM_{uy}^{ii}. As we will see in the sequel, this information is known and fixed at the “subsystems” considered in the spreading networks application studied in this paper.

Remark 3

A further simplified necessary condition than (11) can be obtained if the matrices XiklX_{i}^{kl} and 𝒳¯iikl\bar{\mathcal{X}}_{ii}^{kl} (i.e., subsystem and network level dissipativity measures) are limited to be scalar matrices, over all k,l2k,l\in\mathbb{N}_{2} and iNi\in\mathbb{N}_{N}. The idea is to reapply the diagonal block extraction and “block element-wise” formulation technique used in Prop. 3, for (11). Note that this simplification will be further significant if MuyiiM_{uy}^{ii} is a zero matrix or has a zero in its diagonal.

II-F Constraints

When designing an interconnection matrix MM for a networked system, instead of designing it from scratch, it is often required to minimize (or constrain) deviations from an existing interconnection matrix M¯\bar{M}. However, including such an objective (or constrain) in the design techniques presented in Prop. 2 and Co. 2 makes the problem bilinear due to the involved change of variables, typically of the form L=XMM=X1LL=XM\iff M=X^{-1}L where XX and LL are the actual design variables. Nevertheless, there are some approximate strategies that we can use.

Consider an objective function of the form

JMM¯=X1LX1XM¯XX1,J\triangleq\|M-\bar{M}\|=\|X^{-1}L-X^{-1}X\bar{M}\|\|X\|\|X\|^{-1},

which leads to

X1LXM¯JX1LXM¯.\|X\|^{-1}\|L-X\bar{M}\|\leq J\leq\|X^{-1}\|\|L-X\bar{M}\|.

This motivates an objective function of the form:

J^=LXM¯+λX\hat{J}=\|L-X\bar{M}\|+\lambda\|X\|

with λ0\lambda\geq 0 for the design problems.

On the other hand, consider a scenario where we require the designed interconnection matrix MM to be constrained with respect to the nominal M¯\bar{M} so that

MM¯M¯δMM¯2δ2M¯2\frac{\|M-\bar{M}\|}{\|\bar{M}\|}\leq\delta\iff\|M-\bar{M}\|^{2}\leq\delta^{2}\|\bar{M}\|^{2} (14)

holds where δ[0,1]\delta\in[0,1] represents the allowed deviation from the nominal values. If the involved matrix norm above is the 2-norm (i.e., the matrix spectral norm, a.k.a., the largest singular value), we can obtain an equivalent condition as

0\displaystyle 0\leq δ2M¯M¯(MM¯)(MM¯)\displaystyle\ \delta^{2}\bar{M}^{\top}\bar{M}-(M-\bar{M})^{\top}(M-\bar{M})
0[𝐈MM¯MM¯δ2M¯M¯]\displaystyle\ \iff 0\leq\begin{bmatrix}\mathbf{I}&M-\bar{M}\\ M^{\top}-\bar{M}^{\top}&\delta^{2}\bar{M}^{\top}\bar{M}\end{bmatrix}
0[XXLXM¯LM¯Xδ2M¯M¯].\displaystyle\ \iff 0\leq\begin{bmatrix}XX^{\top}&L-X\bar{M}\\ L^{\top}-\bar{M}^{\top}X^{\top}&\delta^{2}\bar{M}^{\top}\bar{M}\end{bmatrix}.

The last two steps above result from the Schur complement and congruence techniques. Note that the final result is a bilinear matrix inequality in design variables X,LX,L due to the involved XXXX^{\top} term. However, a necessary condition for (14) can be obtained as

0[XY+YXYYLXM¯LM¯Xδ2M¯M¯],0\leq\begin{bmatrix}XY^{\top}+YX^{\top}-YY^{\top}&L-X\bar{M}\\ L^{\top}-\bar{M}^{\top}X^{\top}&\delta^{2}\bar{M}^{\top}\bar{M}\end{bmatrix},

using the fact that, for any matrix YY,

0(XY)(XY)XY+YXYYXX.0\leq(X-Y)(X-Y)^{\top}\iff XY^{\top}+YX^{\top}-YY^{\top}\leq XX^{\top}.
α¯2E𝒫1EE+E1α¯2𝒫\bar{\alpha}^{2}E^{\top}\mathcal{P}^{-1}E\succeq E+E^{\top}-\frac{1}{\bar{\alpha}^{2}}\mathcal{P}

Finally, reapplying the Schur complement technique, we get

0[𝐈Y𝟎YXY+YXLXM¯𝟎LM¯Xδ2M¯M¯].0\leq\begin{bmatrix}\mathbf{I}&Y^{\top}&\mathbf{0}\\ Y&XY^{\top}+YX^{\top}&L-X\bar{M}\\ \mathbf{0}&L^{\top}-\bar{M}^{\top}X^{\top}&\delta^{2}\bar{M}^{\top}\bar{M}\end{bmatrix}. (15)

Once a candidate solution for the design variables X,LX,L are known, as (15) is linear in YY, it can then be used to update the initial choice of YY. If such updates are executed iteratively, desired convergence condition is Y=XY=X.

Now, if the constraint (14) is element-wise, i.e.,

δM¯MM¯δM¯,-\delta\bar{M}\ll M-\bar{M}\ll\delta\bar{M},

where δ[0,1]\delta\in[0,1], we can obtain an equivalent condition as

δXM¯LXM¯δXM¯,-\delta X\bar{M}\ll L-X\bar{M}\ll\delta X\bar{M},

when X>0X>0 and XX is diagonal.

II-G Scalable Mesh Stability

Enforcing dissipativity in a networked system ensures the dissipation of disturbances. In contrast, enforcing scalable mesh stability (SMS), as defined below, ensures the dispersion of the disturbances over the network.

For this discussion, let us consider the networked system Σ\Sigma shown in Fig. 1 under the constraints (9). In this setting, each subsystem Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} (4) can be described by (with a slight abuse of notation)

x˙i(t)=fi(xi(t),ui(t))=fi(xi(t),{xj(t):j𝒩i},wi(t)),\dot{x}_{i}(t)=f_{i}(x_{i}(t),u_{i}(t))=f_{i}(x_{i}(t),\{x_{j}(t):j\in\mathcal{N}_{i}\},w_{i}(t)), (16)

were ui(t)=jNMuyijxj(t)+wi(t)u_{i}(t)=\sum_{j\in\mathbb{N}_{N}}M_{uy}^{ij}x_{j}(t)+w_{i}(t) and 𝒩i{jN:Muyij𝟎,ji}\mathcal{N}_{i}\triangleq\{j\in\mathbb{N}_{N}:M_{uy}^{ij}\neq\mathbf{0},j\neq i\} denotes the set of neighbors of each subsystem Σi,iN\Sigma_{i},i\in\mathbb{N}_{N}.

Definition 3

[5] A subsystem Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} (16) is input-to-state stable (ISS) if there exists functions βi𝒦,γi𝒦\beta_{i}\in\mathcal{KL},\ \gamma_{i}\in\mathcal{K}_{\infty} and σi𝒦\sigma_{i}\in\mathcal{K}_{\infty} such that

|xi(t)|βi(|xi(t0)|,tt0)+γi(maxj𝒩ixi)+σi(wi).|x_{i}(t)|\leq\beta_{i}(|x_{i}(t_{0})|,t-t_{0})+\gamma_{i}(\max_{j\in\mathcal{N}_{i}}\|x_{i}\|_{\infty})+\sigma_{i}(\|w_{i}\|_{\infty}).
Definition 4

[5] The networked system comprised of the subsystems (16) is said to be scalable mesh stable (SMS) if the ISS property of each subsystem implies the existence of some functions β𝒦\beta\in\mathcal{KL} and σ𝒦\sigma\in\mathcal{K}_{\infty} such that

maxiN|xi(t)|β(maxiN|xi(t0)|,tt0)+σ(maxiNwi),\max_{i\in\mathbb{N}_{N}}|x_{i}(t)|\leq\beta(\max_{i\in\mathbb{N}_{N}}|x_{i}(t_{0})|,t-t_{0})+\sigma(\max_{i\in\mathbb{N}_{N}}\|w_{i}\|_{\infty}),

for any initial condition xi(t0)x_{i}(t_{0}) and any disturbance function wi,iNw_{i},i\in\mathbb{N}_{N}.

Proposition 4

[5] The networked system comprised of the subsystems (16) is SMS (see Def. 4) if each subsystem is ISS such that there exists γ~(0,1)\tilde{\gamma}\in(0,1) that satisfies

γi(s)γ~s,s0,iN.\gamma_{i}(s)\leq\tilde{\gamma}s,\quad\forall s\geq 0,i\in\mathbb{N}_{N}.

The following proposition provides the additional conditions that should be included in the networked system design problem so as to ensure the SMS property. However, we require the following slightly stronger assumption than As. 1 regarding the nature of the subsystem dissipativity.

Assumption 2

Each subsystem Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} (16) is XiX_{i}-dissipative (from input ui(t)u_{i}(t) to output xi(t)x_{i}(t)) where Xi=Xi=[Xikl]k,l2X_{i}=X_{i}^{\top}=[X_{i}^{kl}]_{k,l\in\mathbb{N}_{2}} is such that Xi11>0X_{i}^{11}>0, and the corresponding storage function is Vi(xi)xiPixiV_{i}(x_{i})\triangleq x_{i}^{\top}P_{i}x_{i} where Pi>0P_{i}>0.

Proposition 5

Under As. 2 and constraints (9), the networked system comprised of the subsystems (16) can be made 𝒳\mathcal{X}-dissipative (from input w(t)w(t) to output z(t)z(t), where 𝒳=𝒳=[𝒳kl]k,l2\mathcal{X}=\mathcal{X}^{\top}=[\mathcal{X}^{kl}]_{k,l\in\mathbb{N}_{2}} with 𝒳22<0\mathcal{X}^{22}<0) as well as SMS by designing the interconnection matrix MM via the LMI problem

Find: Luy,{pi:iN}\displaystyle L_{uy},\{p_{i}:i\in\mathbb{N}_{N}\} (17)
Sub. to: pi>0,iN,Φ>0,\displaystyle p_{i}>0,\ \forall i\in\mathbb{N}_{N},\ \Phi>0,
λ~i1jN|(Xi11)1Luyij|<pi,\displaystyle\tilde{\lambda}_{i1}\sum_{j\in\mathbb{N}_{N}}|(X_{i}^{11})^{-1}L_{uy}^{ij}|<p_{i},

where Φ\Phi is as defined in (8), and Muy(Xp11)1LuyM_{uy}\triangleq(\textbf{X}_{p}^{11})^{-1}L_{uy}.

Proof:

Compared to Co. 2, here we only have to establish the SMS property for the networked system. Note that we will omit explicitly denoting the time dependence of variables for notational convenience.

According to As. 2, as each subsystem Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} is XiX_{i}-dissipative, we have

V˙i(xi)\displaystyle\dot{V}_{i}(x_{i}) xiXi22xi+xiXi21ui+xiXi21ui+uiXi11ui\displaystyle\leq x_{i}^{\top}X_{i}^{22}x_{i}+x_{i}^{\top}X_{i}^{21}u_{i}+x_{i}^{\top}X_{i}^{21}u_{i}+u_{i}^{\top}X_{i}^{11}u_{i}
xi(Xi22+Xi21)xi+ui(Xi11+Xi12)ui\displaystyle\leq x_{i}(X_{i}^{22}+X_{i}^{21})x_{i}+u_{i}^{\top}(X_{i}^{11}+X_{i}^{12})u_{i}
xiQixi+uiRiui,\displaystyle\leq-x_{i}Q_{i}x_{i}+u_{i}^{\top}R_{i}u_{i},
λ¯(Qi)|xi|2+λ¯(Ri)|ui|2\displaystyle\leq-\underline{\lambda}(Q_{i})|x_{i}|^{2}+\overline{\lambda}(R_{i})|u_{i}|^{2} (18)

where we select QiQ_{i} and RiR_{i} so that

(Xi22+Xi21)Qi<0, and (Xi11+Xi12)Ri.(X_{i}^{22}+X_{i}^{21})\leq-Q_{i}<0,\mbox{ and }(X_{i}^{11}+X_{i}^{12})\leq R_{i}. (19)

Moreover, as each subsystem Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} has a quadratic storage function of the form Vi(xi)=xiPixiV_{i}(x_{i})=x_{i}^{\top}P_{i}x_{i}, we have

λ¯(Pi)|xi|2Vi(xi)λ¯(Pi)|xi|2.\underline{\lambda}(P_{i})|x_{i}|^{2}\leq V_{i}(x_{i})\leq\overline{\lambda}(P_{i})|x_{i}|^{2}. (20)

Applying (20) in (18) leads to

V˙i(xi)\displaystyle\dot{V}_{i}(x_{i}) λ¯(Qi)λ¯(Pi)Vi(xi)+λ¯(Ri)|ui|2\displaystyle\leq-\frac{\underline{\lambda}(Q_{i})}{\overline{\lambda}(P_{i})}V_{i}(x_{i})+\overline{\lambda}(R_{i})|u_{i}|^{2}
=μiVi(xi)+θi\displaystyle=-\mu_{i}V_{i}(x_{i})+\theta_{i} (21)

where we define μiλ¯(Qi)λ¯(Pi)\mu_{i}\triangleq\frac{\underline{\lambda}(Q_{i})}{\overline{\lambda}(P_{i})} and θiλ¯(Ri)|ui|2\theta_{i}\triangleq\overline{\lambda}(R_{i})|u_{i}|^{2}. Note that (21) implies that

Vi(xi)\displaystyle V_{i}(x_{i}) (1eμit)θiμi+Vi(xi(0))eμit\displaystyle\leq(1-e^{-\mu_{i}t})\frac{\theta_{i}}{\mu_{i}}+V_{i}(x_{i}(0))e^{-\mu_{i}t}
θiμi+λ¯(Pi)|xi(0)|2eμit.\displaystyle\leq\frac{\theta_{i}}{\mu_{i}}+\overline{\lambda}(P_{i})|x_{i}(0)|^{2}e^{-\mu_{i}t}. (22)

where we have further used the fact (1eμit)1(1-e^{-\mu_{i}t})\leq 1 and (20). Using (20) and the definitions of θi\theta_{i} and μi\mu_{i}, (22) implies

|xi(t)|2λ¯(Ri)λ¯(Pi)λ¯(Pi)λ¯(Qi)|ui|2+λ¯(Pi)λ¯(Pi)|xi(0)|2eμit,|x_{i}(t)|^{2}\leq\frac{\overline{\lambda}(R_{i})\overline{\lambda}(P_{i})}{\underline{\lambda}(P_{i})\underline{\lambda}(Q_{i})}|u_{i}|^{2}+\frac{\overline{\lambda}(P_{i})}{\underline{\lambda}(P_{i})}|x_{i}(0)|^{2}e^{-\mu_{i}t},

which, using the fact that a+ba+b\sqrt{a+b}\leq\sqrt{a}+\sqrt{b}, leads to

|xi(t)|λ¯(Ri)λ¯(Pi)λ¯(Pi)λ¯(Qi)|ui|+λ¯(Pi)λ¯(Pi)|xi(0)|eμi2t,|x_{i}(t)|\leq\sqrt{\frac{\overline{\lambda}(R_{i})\overline{\lambda}(P_{i})}{\underline{\lambda}(P_{i})\underline{\lambda}(Q_{i})}}|u_{i}|+\sqrt{\frac{\overline{\lambda}(P_{i})}{\underline{\lambda}(P_{i})}}|x_{i}(0)|e^{-\frac{\mu_{i}}{2}t}, (23)

We will next bound the term |ui||u_{i}|. Using the relationship ui=jNMuyijxj+wiu_{i}=\sum_{j\in\mathbb{N}_{N}}M_{uy}^{ij}x_{j}+w_{i}, we get

|ui|\displaystyle|u_{i}| jN|Muyijxj|+|wi|,\displaystyle\leq\sum_{j\in\mathbb{N}_{N}}|M_{uy}^{ij}x_{j}|+|w_{i}|,
jN|Muyij||xj|+|wi|\displaystyle\leq\sum_{j\in\mathbb{N}_{N}}|M_{uy}^{ij}||x_{j}|+|w_{i}|
jN|Muyij|maxjNxj+wi.\displaystyle\leq\sum_{j\in\mathbb{N}_{N}}|M_{uy}^{ij}|\max_{j\in\mathbb{N}_{N}}\|x_{j}\|_{\infty}+\|w_{i}\|_{\infty}.

Applying this result in (23) gives

|xi(t)|\displaystyle|x_{i}(t)|\leq λ~i1jN|Muyij|maxjNxj+λ~i1wi\displaystyle\tilde{\lambda}_{i1}\sum_{j\in\mathbb{N}_{N}}|M_{uy}^{ij}|\max_{j\in\mathbb{N}_{N}}\|x_{j}\|_{\infty}+\tilde{\lambda}_{i1}\|w_{i}\|_{\infty} (24)
+λ~i2|xi(0)|eμi2t,\displaystyle+\tilde{\lambda}_{i2}|x_{i}(0)|e^{-\frac{\mu_{i}}{2}t},

where ~λ_i1 ≜λ(Ri)λ(Pi)λ(Pi)λ(Qi) and ~λ_i2 ≜λ(Pi)λ(Pi).

Based on Prop. 4 and Def. 3, the networked system to be SMS, we require the existence of functions βi𝒦\beta_{i}\in\mathcal{KL} and σi𝒦\sigma_{i}\in\mathcal{K}_{\infty} such that —x_i(t) —≤β_i(—x_i(t_0)—, t-t_0) + ~γ max_j∈N_N ∥x_i ∥_∞+ σ_i(∥w_i ∥_∞), for all iNi\in\mathbb{N}_{N} where γ~\tilde{\gamma} is a scalar γ~(0,1)\tilde{\gamma}\in(0,1). Comparing this with (24) we can obtain the condition for the SMS of the networked system as

λ~i1jN|Muyij|<1,iN.\tilde{\lambda}_{i1}\sum_{j\in\mathbb{N}_{N}}|M_{uy}^{ij}|<1,\quad\forall i\in\mathbb{N}_{N}.

Finally, under the change of variables relationship, M_uy≜(X_p^11)^-1 L_uy ⇔M_uy^ij = (p_iX_i^11)^-1 L_uy^ij, ∀i∈N_N, the condition for the SMS of the networked system becomes

λ~i1jN|(Xi11)1Luyij|<pi,iN.\tilde{\lambda}_{i1}\sum_{j\in\mathbb{N}_{N}}|(X_{i}^{11})^{-1}L_{uy}^{ij}|<p_{i},\quad\forall i\in\mathbb{N}_{N}. (25)

III Problem Formulation

III-A Spreading Network

Consider an epidemic spreading over a network Σ\Sigma consisting of NN\in\mathbb{N} groups denoted by {Σi:iN}\{\Sigma_{i}:i\in\mathbb{N}_{N}\}. Each group Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} can be represented by an open graph 𝒢i(𝒱i,i)\mathcal{G}_{i}\equiv(\mathcal{V}_{i},\mathcal{E}_{i}), where vertices 𝒱i{Σi,k:kNi}\mathcal{V}_{i}\triangleq\{\Sigma_{i,k}:k\in\mathbb{N}_{N_{i}}\} represent the nodes, edges i𝒱i×𝒱i\mathcal{E}_{i}\subseteq\mathcal{V}_{i}\times\mathcal{V}_{i} represent the epidemic spreading interactions between the nodes, and NiN_{i} is the total number of nodes in the group 𝒢i\mathcal{G}_{i}.

For a group Σi,iN\Sigma_{i},i\in\mathbb{N}_{N}, an intra-group transmission matrix Mii[Mii,kl]k,lNi0Ni×NiM_{ii}\triangleq[M_{ii,kl}]_{k,l\in\mathbb{N}_{N_{i}}}\in\mathbb{R}^{N_{i}\times N_{i}}_{\geq 0} is used to contain all the transmission rate values corresponding to the node interactions within the group. In particular, having a positive transmission rate value Mii,kl>0M_{ii,kl}>0 implies the existence of a directed edge (Σi,l,Σi,k)𝒱i(\Sigma_{i,l},\Sigma_{i,k})\in\mathcal{V}_{i}, indicating that node Σi,l\Sigma_{i,l} can infect the node Σi,k\Sigma_{i,k}, where k,lNik,l\in\mathbb{N}_{N_{i}} (allowing self-infections, i.e., k=lk=l) and iNi\in\mathbb{N}_{N}. Clearly, the intra-group transmission matrix MiiM_{ii} fully defines (implies) the epidemic spreading interactions 𝒱i\mathcal{V}_{i} within the group Σi,iN\Sigma_{i},i\in\mathbb{N}_{N}.

Extending this notion of intra-group transmission matrices, we define inter-group transmission matrices to contain transmission rate values corresponding to node interactions across different groups. For example, the inter-group transmission matrix Mij[Mij,kl]kNi,lNj0Ni×NjM_{ij}\triangleq[M_{ij,kl}]_{k\in\mathbb{N}_{N_{i}},l\in\mathbb{N}_{N_{j}}}\in\mathbb{R}^{N_{i}\times N_{j}}_{\geq 0}, represents the spreading interactions directed from the nodes {Σj,l,lNj}\{\Sigma_{j,l},l\in\mathbb{N}_{N_{j}}\} in the group Σj\Sigma_{j} towards the nodes {Σi,k:kNi}\{\Sigma_{i,k}:k\in\mathbb{N}_{N_{i}}\} in the group Σi\Sigma_{i} where i,jNi,j\in\mathbb{N}_{N} and iji\neq j. In particular, having a positive transmission rate value Mij,kl>0M_{ij,kl}>0 implies the existence of a global directed edge (Σj,l,Σi,k)(\Sigma_{j,l},\Sigma_{i,k}), indicating that node Σj,l\Sigma_{j,l} can infect the node Σi,k\Sigma_{i,k}, where kNi,lNjk\in\mathbb{N}_{N_{i}},l\in\mathbb{N}_{N_{j}} and i,jNi,j\in\mathbb{N}_{N} with iji\neq j.

The network Susceptible-Infected-Susceptible (SIS) model is used to model the dynamics of the infected proportion (also called the “state”) xi,k(t)[0,1]x_{i,k}(t)\in[0,1] in each node Σi,k,kNi,iN\Sigma_{i,k},k\in\mathbb{N}_{N_{i}},i\in\mathbb{N}_{N}, as

Σi,k:{x˙i,k(t)=γi,k(t)xi,k(t)+(1xi,k(t))ui,k(t),\Sigma_{i,k}:\Big\{\dot{x}_{i,k}(t)=-\gamma_{i,k}(t)\,x_{i,k}(t)\,+\,(1-x_{i,k}(t))u_{i,k}(t), (26)

where γi,k(t)\gamma_{i,k}(t) is the total recovery rate and ui,k(t)u_{i,k}(t) is the external infection effect (also called the “input”). In particular, γi,k(t)γ¯i,k+γ~i,k(t)\gamma_{i,k}(t)\triangleq\bar{\gamma}_{i,k}+\tilde{\gamma}_{i,k}(t), where γ¯i,k\bar{\gamma}_{i,k} is the mean recovery rate and γ~i,k(t)\tilde{\gamma}_{i,k}(t) accounts for the uncertainty/modeling errors in the recovery rate so that |γ~i,k(t)|δi,k|\tilde{\gamma}_{i,k}(t)|\leq\delta_{i,k} (both γ¯i,k\bar{\gamma}_{i,k} and δi,k\delta_{i,k} are assumed as known and fixed, and satisfies γ¯i,kδi,k>0\bar{\gamma}_{i,k}-\delta_{i,k}>0). On the other hand, in (26), ui,k(t)u_{i,k}(t) is defined as

ui,k(t)jNlNjMij,klxj,l(t)+wi,k(t),u_{i,k}(t)\triangleq\sum_{\begin{subarray}{c}j\in\mathbb{N}_{N}\end{subarray}}\sum_{l\in\mathbb{N}_{N_{j}}}M_{ij,kl}x_{j,l}(t)+w_{i,k}(t), (27)

and wi,k(t)w_{i,k}(t) is a disturbance input that accounts for modeling errors related to transmission rates.

III-B Networked System Representation

The considered spreading network Σ\Sigma (26)-(27) can be viewed as a networked system, more precisely, as a hierarchy of networked systems, as shown in Fig. 2.

To see this, we first split the input ui,k(t),kNi,iNu_{i,k}(t),k\in\mathbb{N}_{N_{i}},i\in\mathbb{N}_{N} in (27) into local and global components, respectively denoted by ui,kL(t)u_{i,k}^{L}(t) and ui,kG(t)u_{i,k}^{G}(t), as

ui,k(t)=ui,kL(t)+ui,kG(t),u_{i,k}(t)=u_{i,k}^{L}(t)+u_{i,k}^{G}(t),

where ui,kL(t)u_{i,k}^{L}(t) is defined using the intra-group interactions as

ui,kL(t)lNiMii,klxi,l(t),u_{i,k}^{L}(t)\triangleq\sum_{l\in\mathbb{N}_{N_{i}}}M_{ii,kl}x_{i,l}(t), (28)

and ui,kG(t)u_{i,k}^{G}(t) is defined using the inter-group interactions as

ui,kG(t)jNjilNjMij,klxj,l(t)+wi,k(t).u_{i,k}^{G}(t)\triangleq\sum_{\begin{subarray}{c}j\in\mathbb{N}_{N}\\ j\neq i\end{subarray}}\sum_{l\in\mathbb{N}_{N_{j}}}M_{ij,kl}x_{j,l}(t)+w_{i,k}(t). (29)

We next vectorized (28) over k,lNik,l\in\mathbb{N}_{N_{i}} to obtain

uiL(t)=Miixi(t),u_{i}^{L}(t)=M_{ii}x_{i}(t), (30)

where uiL(t)[ui,kL(t)]kNiu_{i}^{L}(t)\triangleq[u_{i,k}^{L}(t)]_{k\in\mathbb{N}_{N_{i}}}^{\top} and xi(t)[xi,k]kNix_{i}(t)\triangleq[x_{i,k}]_{k\in\mathbb{N}_{N_{i}}}^{\top} are the vectorized local input and state of the group Σi,iN\Sigma_{i},i\in\mathbb{N}_{N}, respectively. Subsequently, the vectorized version of (29) over k,lNik,l\in\mathbb{N}_{N_{i}} can be obtained as

uiG(t)=jNjiMijxj(t)+wi(t),u_{i}^{G}(t)=\sum_{\begin{subarray}{c}j\in\mathbb{N}_{N}\\ j\neq i\end{subarray}}M_{ij}x_{j}(t)+w_{i}(t), (31)

where uiG(t)[ui,kG(t)]kNiu_{i}^{G}(t)\triangleq[u_{i,k}^{G}(t)]_{k\in\mathbb{N}_{N_{i}}}^{\top} and wi(t)[wi,k(t)]kNiw_{i}(t)\triangleq[w_{i,k}(t)]_{k\in\mathbb{N}_{N_{i}}}^{\top} are the vectorized global input and disturbance of the group Σi,iN\Sigma_{i},i\in\mathbb{N}_{N}, respectively. We also define

ui(t)uiL(t)+uiG(t)=Miixi(t)+uiG(t)u_{i}(t)\triangleq u_{i}^{L}(t)+u_{i}^{G}(t)=M_{ii}x_{i}(t)+u_{i}^{G}(t)

as the vectorized total input of the group Σi,iN\Sigma_{i},i\in\mathbb{N}_{N}.

Each group Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} now can be seen as a networked system Σi:uiG(t)xi(t)\Sigma_{i}:u_{i}^{G}(t)\rightarrow x_{i}(t) (see Fig. 1), comprised of the nodes {Σi,k:kNi}\{\Sigma_{i,k}:k\in\mathbb{N}_{N_{i}}\} interconnected according to the interconnection matrix

𝐌i=[Mii𝐈𝐈𝟎],\mathbf{M}_{i}=\begin{bmatrix}M_{ii}&\mathbf{I}\\ \mathbf{I}&\mathbf{0}\end{bmatrix}, (32)

where the external input is uiG(t)u_{i}^{G}(t) and the output is xi(t)x_{i}(t).

Next, we continue vectorizing (31) over iNi\in\mathbb{N}_{N}, to obtain

uG(t)=M¯x(t)+w(t),u^{G}(t)=\bar{M}x(t)+w(t),

where uG(t)[(uiG(t))]iNiu^{G}(t)\triangleq[(u_{i}^{G}(t))^{\top}]_{i\in\mathbb{N}_{N_{i}}}^{\top}, x(t)[xi(t)]kNix(t)\triangleq[x_{i}^{\top}(t)]_{k\in\mathbb{N}_{N_{i}}}^{\top} and w(t)[wi(t)]kNiw(t)\triangleq[w_{i}^{\top}(t)]_{k\in\mathbb{N}_{N_{i}}}^{\top} are the vectorized global input, state and disturbance, respectively, and M¯[M¯ij]i,jN\bar{M}\triangleq[\bar{M}_{ij}]_{i,j\in\mathbb{N}_{N}} with M¯ijMij𝟏{ij}\bar{M}_{ij}\triangleq M_{ij}\mathbf{1}_{\{i\neq j\}} is the transmission matrix representing all inter-group interactions over the spreading network.

Finally, we can view the spreading network as a networked system Σ:w(t)x(t)\Sigma:w(t)\rightarrow x(t) (see Fig. 1), comprised of the groups {Σi:iN}\{\Sigma_{i}:i\in\mathbb{N}_{N}\} interconnected according to the interconnection matrix

M=[M¯𝐈𝐈𝟎],\textbf{M}=\begin{bmatrix}\bar{M}&\mathbf{I}\\ \mathbf{I}&\mathbf{0}\end{bmatrix}, (33)

where the external input is w(t)w(t) that represents disturbances due to unmodeled dynamics, and the output is x(t)x(t) that acts as a performance input for the spreading network.

Refer to caption
Figure 2: Spreading Network as a Networked System

Problem

Our goal is to determine a set of optimal alterations for the inter-group interconnections (i.e., M¯\bar{M}) to ensure the stability and robustness of the infections-free state (i.e., x=𝟎x=\mathbf{0}) for the spreading network. In this pursuit, we also provide recommendations for improving inter-group interactions (i.e., Mii,iNM_{ii},\forall i\in\mathbb{N}_{N}), if it is imperative to achieving stability and robustness of the infections-free state for the spreading network.

IV Dissipativity-Based Solution

IV-A Dissipativity Analysis and Design

We begin by establishing the dissipativity properties of the nodes.

Lemma 1

Each node Σi,k,kNi,iN\Sigma_{i,k},\,k\in\mathbb{N}_{N_{i}},\,i\in\mathbb{N}_{N} (26) in the spreading network is Xi,kX_{i,k}-dissipative (from ui,k(t)u_{i,k}(t) to xi,k(t)x_{i,k}(t)) where Xi,k[abbc]X_{i,k}\triangleq\scriptsize\begin{bmatrix}a&b\\ b&c\end{bmatrix} is given by LMI problem:

Find: p,a,b,c,\displaystyle\mbox{Find: }\ p,\ a,\ b,\ c,\ (34)
Sub. to: p>0,\displaystyle\mbox{Sub. to: }\ p>0,
{a0,(2bp)0,(c+p(γ¯i,kδi,k))0,ora>0,b0,[abbc+p(γ¯i,kδi,k)]0.\displaystyle
Proof:

The proof follows directly from applying Prop. 1 for the node dynamics (26) as it is identical to (2). ∎

Next, we use the established node dissipativity properties to identify the group dissipativity properties.

Lemma 2

Each group Σi,iN\Sigma_{i},\,i\in\mathbb{N}_{N} (see Fig. 2) in the spreading network is 𝒳i\mathcal{X}_{i}-dissipative (from uiG(t)u_{i}^{G}(t) to xi(t)x_{i}(t)) where 𝒳i[𝒳ilm]l,m2\mathcal{X}_{i}\triangleq[\mathcal{X}_{i}^{lm}]_{l,m\in\mathbb{N}_{2}} is given by the LMI problem:

Find: 𝒳i,{pi,k:kNi}\displaystyle\mathcal{X}_{i},\{p_{i,k}:k\in\mathbb{N}_{N_{i}}\} (35)
Sub. to: pi,k>0,kNi,Φi>0,\displaystyle p_{i,k}>0,\ \forall k\in\mathbb{N}_{N_{i}},\ \Phi_{i}>0,

where Φi\Phi_{i} is as defined in (42), and Xpilm\textbf{X}_{p_{i}}^{lm} for any l,m2l,m\in\mathbb{N}_{2} is defined using the known node dissipativity properties {Xi,klm:kNi}\{X_{i,k}^{lm}:k\in\mathbb{N}_{N_{i}}\} as Xpilmdiag([pi,kXi,klm]kNi)\textbf{X}_{p_{i}}^{lm}\triangleq diag([p_{i,k}X_{i,k}^{lm}]_{k\in\mathbb{N}_{N_{i}}}).

Proof:

Using the networked system representation (32) of each group Σi,iN\Sigma_{i},\,i\in\mathbb{N}_{N}, for its 𝒳i\mathcal{X}_{i}-dissipativity analysis, we can apply Co. 2. To this end, we first verify that As. 1 holds for each group Σi,iN\Sigma_{i},\,i\in\mathbb{N}_{N} as dissipativity properties Xi,kX_{i,k} of each node Σi,k,kNi\Sigma_{i,k},\,k\in\mathbb{N}_{N_{i}} identified in Lm. 1 satisfies Xi,k11>0X_{i,k}^{11}>0. Next, we introduce an extra constraint for the design variable LuyL_{uy} in Co. 2 as Luy=Xp11MuyL_{uy}=\textbf{X}_{p}^{11}M_{uy} as Co. 2 is originally intended for design problems (not for analysis problems). Consequently, we can obtain (35). ∎

Next, we use the established group dissipativity properties to optimize the inter-group interconnections to ensure (or optimize) the dissipativity of the spreading network.

Lemma 3

The spreading network Σ\Sigma shown in Fig. 2 can be made 𝔛\mathfrak{X}-dissipative (from input w(t)w(t) to output x(t)x(t)) where 𝔛[𝔛lm]l,m2\mathfrak{X}\triangleq[\mathfrak{X}^{lm}]_{l,m\in\mathbb{N}_{2}}, by designing the interconnection matrix M¯\bar{M} via the LMI problem

Find: L,{pi:iN}\displaystyle L,\{p_{i}:i\in\mathbb{N}_{N}\} (36)
Sub. to: pi>0,iN,Φ>0\displaystyle p_{i}>0,\ \forall i\in\mathbb{N}_{N},\ \Phi>0

where Φ\Phi is as defined in (43), 𝓧\mathbfcal{X}_{p}^{lm} for any l,m2l,m\in\mathbb{N}_{2} is defined using the known group dissipativity properties {𝒳ilm:iN}\{\mathcal{X}_{i}^{lm}:i\in\mathbb{N}_{N}\} as 𝓧}([𝒳]𝒩𝓝)\mathbfcal{X}_{p}^{lm}\triangleq diag([p_{i}\mathcal{X}_{i}^{lm}]_{i\in\mathbb{N}_{N_{i}}}), 𝓧}([(𝒳)𝒳]𝒩𝓝)\mathbfcal{X}^{12}\triangleq diag([(\mathcal{X}_{i}^{11})^{-1}\mathcal{X}_{i}^{12}]_{i\in\mathbb{N}_{N}}), 𝓧(𝓧)\mathbfcal{X}^{21}\triangleq(\mathbfcal{X}^{12})^{\top}, LL shares the structure of M¯\bar{M}, and M¯(𝓧)𝓛\bar{M}\triangleq(\mathbfcal{X}_{p}^{11})^{-1}L.

Proof:

Based on the networked system representation (33) of the spreading network Σ\Sigma, to synthesize its interconnection matrix M¯\bar{M} to ensure/optimize its 𝔛\mathfrak{X}-dissipativity, we can apply Co. 2. In this pursuit, we first verify that As. 1 holds for Σ\Sigma as dissipativity properties 𝒳i\mathcal{X}_{i} of each group Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} identified in Lm. 2 satisfies 𝒳i11>0\mathcal{X}_{i}^{11}>0. Consequently, starting from (10), we can obtain (36). ∎

When designing the interconnection matrix M¯\bar{M}, to optimize the deviations from a given nominal interconnection matrix M¯0\bar{M}_{0} (i.e., to optimize M¯M¯0\|\bar{M}-\bar{M}_{0}\|), in the LMI problem (36), one can use an objective function of the form

J=L𝓧𝓜¯+α𝓧+β𝒳J=\|L-\mathbfcal{X}_{p}^{11}\bar{M}_{0}\|+\alpha\|\mathbfcal{X}_{p}^{11}\|+\beta\|\mathfrak{X}\| (37)

with some scaling coefficients α,β0\alpha,\beta\geq 0. While the first two terms aim to minimize the deviations from the nominal interconnection matrix, the last term ensures the rate of the stored energy is minimized.

On the other hand, when the designed interconnection matrix M¯\bar{M} needs to be constrained with respect to a given nominal interconnection matrix M¯0\bar{M}_{0} so that M¯M¯0δM¯,δ(0,1),\|\bar{M}-\bar{M}_{0}\|\leq\delta\|\bar{M}\|,\delta\in(0,1), one can include an additional LMI constraint in the LMI problem (36) as

0[𝐈Y𝟎Y𝓧𝓨+𝓨𝓧L𝓧𝓜¯𝟎LM¯0𝓧δ2M¯0M¯0],0\leq\begin{bmatrix}\mathbf{I}&Y^{\top}&\mathbf{0}\\ Y&\mathbfcal{X}_{p}^{11}Y^{\top}+Y\mathbfcal{X}_{p}^{11}&L-\mathbfcal{X}_{p}^{11}\bar{M}_{0}\\ \mathbf{0}&L^{\top}-\bar{M}_{0}^{\top}\mathbfcal{X}_{p}^{11}&\delta^{2}\bar{M}_{0}^{\top}\bar{M}_{0}\end{bmatrix}, (38)

with some Y>0Y>0 (e.g., Y=𝐈Y=\mathbf{I}, or ideally, Y𝓧Y\simeq\mathbfcal{X}_{p}^{11}). Note also that, in the above proposed LMI constraint, δ\delta can be treated as a design variable to be minimized.

If the matrix 𝓧\mathbfcal{X}_{p}^{11} takes a diagonal form (i.e., if each 𝒳i11\mathcal{X}_{i}^{11} is diagonal), an element-wise version of the above constraint M¯M¯0δM¯,δ(0,1),\|\bar{M}-\bar{M}_{0}\|\leq\delta\|\bar{M}\|,\delta\in(0,1), can be enforced by including the LMI constraint

δ𝓧𝓜¯𝓛𝓧𝓜¯δ𝓧𝓜¯,-\delta\mathbfcal{X}_{p}^{11}\bar{M}_{0}\ll L-\mathbfcal{X}_{p}^{11}\bar{M}_{0}\ll\delta\mathbfcal{X}_{p}^{11}\bar{M}_{0}, (39)

in the LMI problem (36).

IV-B Supporting Feasibility with Necessary Conditions

The following lemma presents a necessary condition to be included in each node dissipativity analysis to support the feasibility of the corresponding group dissipativity analysis.

Lemma 4

At each group Σi,iN\Sigma_{i},i\in\mathbb{N}_{N}, for the feasibility of its 𝒳i\mathcal{X}_{i}-dissipativity analysis problem (in Lm. 2), a necessary condition that can be enforced at each node Σi,k,kNi\Sigma_{i,k},k\in\mathbb{N}_{N_{i}} in its Xi,kX_{i,k}-dissipativity analysis problem (in Lm. 1, Xi,k[abbc]X_{i,k}\triangleq\scriptsize\begin{bmatrix}a&b\\ b&c\end{bmatrix}\normalsize) is the feasibility of the LMI problem:

Find: a,b,c,a¯,b¯,c¯,\displaystyle\ a,\,b,\,c,\,\bar{a},\,\bar{b},\,\bar{c}, (40)
Sub. to: Φ~i,k>0,\displaystyle\ \tilde{\Phi}_{i,k}>0,
Φ~i,k[a0ama0c¯c¯0amc¯2bmcb+b¯a0b+b¯a¯],\tilde{\Phi}_{i,k}\triangleq\begin{bmatrix}a&0&a\,m&a\\ 0&-\bar{c}&-\bar{c}&0\\ a\,m&-\bar{c}&-2b\,m-c&-b+\bar{b}\\ a&0&-b+\bar{b}&\bar{a}\end{bmatrix},

where [a¯b¯b¯c¯]\scriptsize\begin{bmatrix}\bar{a}&\bar{b}\\ \bar{b}&\bar{c}\end{bmatrix} shadows [𝒳i,klm]l,m2[\mathcal{X}_{i,k}^{lm}]_{l,m\in\mathbb{N}_{2}} (recall that each 𝒳i,klm\mathcal{X}_{i,k}^{lm} is the kkth diagonal element of 𝒳ilm\mathcal{X}^{lm}_{i} in (35)), and mMii,kkm\triangleq M_{ii,kk} is the kk-th diagonal element of MiiM_{ii}.

Proof:

The proof follows directly from applying Prop. 3 for the networked system representation (32) of each group Σi,iN\Sigma_{i},\,i\in\mathbb{N}_{N}, for its 𝒳i\mathcal{X}_{i}-dissipativity analysis. ∎

The following lemma presents a necessary condition to be included in each group dissipativity analysis to support the feasibility of the spreading network design.

Lemma 5

For the feasibility of 𝔛\mathfrak{X}-dissipative spreading network design problem (in Lm. 3), a necessary condition that can be enforced at each group Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} in its 𝒳i\mathcal{X}_{i}-dissipativity analysis problem (in Lm. 2) is the feasibility of the LMI problem:

Find: 𝒳i,𝔛¯i\displaystyle\ \mathcal{X}_{i},\bar{\mathfrak{X}}_{i} (41)
Sub. to: Φ~i>0,\displaystyle\ \tilde{\Phi}_{i}>0,
Φ~i[𝒳i11𝟎𝟎𝒳i11𝟎𝔛¯i22𝔛¯i22𝟎𝟎𝔛¯i22𝒳i22𝒳i21+𝔛¯i21𝒳i11𝟎𝒳i12+𝔛¯i12𝔛¯i11],\tilde{\Phi}_{i}\triangleq\begin{bmatrix}\mathcal{X}_{i}^{11}&\mathbf{0}&\mathbf{0}&\mathcal{X}_{i}^{11}\\ \mathbf{0}&-\bar{\mathfrak{X}}^{22}_{i}&-\bar{\mathfrak{X}}^{22}_{i}&\mathbf{0}\\ \mathbf{0}&-\bar{\mathfrak{X}}^{22}_{i}&-\mathcal{X}_{i}^{22}&-\mathcal{X}_{i}^{21}+\bar{\mathfrak{X}}^{21}_{i}\\ \mathcal{X}_{i}^{11}&\mathbf{0}&-\mathcal{X}_{i}^{12}+\bar{\mathfrak{X}}^{12}_{i}&\bar{\mathfrak{X}}^{11}_{i}\end{bmatrix},

where 𝔛¯i[𝔛¯ilm]l,m2\bar{\mathfrak{X}}_{i}\triangleq[\bar{\mathfrak{X}}_{i}^{lm}]_{l,m\in\mathbb{N}_{2}} shadows [𝔛ilm]l,m2[\mathfrak{X}_{i}^{lm}]_{l,m\in\mathbb{N}_{2}} (recall that each 𝔛ilm\mathfrak{X}_{i}^{lm} is the iith diagonal block of 𝔛lm\mathfrak{X}^{lm} in (35)).

Proof:

The proof follows directly from applying Prop. 3 for the networked system representation (32) of the spreading network, for its 𝔛\mathfrak{X}-dissipative spreading network design problem. In this pursuit, the fact that M¯ii=𝟎,iN\bar{M}_{ii}=\mathbf{0},i\in\mathbb{N}_{N} has been used to simplify the derived necessary condition. ∎

Φi[Xpi110Xpi11MiiXpi110𝒳i22𝒳i22𝟎MiiXpi11𝒳i22MiiXpi12Xpi21MiiXpi22Xpi21+𝒳i21Xpi11𝟎Xpi12+𝒳i12𝒳i11]\Phi_{i}\triangleq\begin{bmatrix}\textbf{X}_{p_{i}}^{11}&\textbf{0}&\textbf{X}_{p_{i}}^{11}M_{ii}&\textbf{X}_{p_{i}}^{11}\\ \textbf{0}&-\mathcal{X}^{22}_{i}&-\mathcal{X}^{22}_{i}&\mathbf{0}\\ M_{ii}^{\top}\textbf{X}_{p_{i}}^{11}&-\mathcal{X}^{22}_{i}&-M_{ii}^{\top}\textbf{X}_{p_{i}}^{12}-\textbf{X}_{p_{i}}^{21}M_{ii}-\textbf{X}_{p_{i}}^{22}&-\textbf{X}_{p_{i}}^{21}+\mathcal{X}^{21}_{i}\\ \textbf{X}_{p_{i}}^{11}&\mathbf{0}&-\textbf{X}_{p_{i}}^{12}+\mathcal{X}^{12}_{i}&\mathcal{X}^{11}_{i}\end{bmatrix} (42)
Φ[𝓧0L𝓧0𝔛22𝔛22𝟎L𝔛22L𝓧𝓧𝓛𝓧𝓧+𝒳𝓧𝟎𝓧+𝒳𝔛11]\Phi\triangleq\begin{bmatrix}\mathbfcal{X}_{p}^{11}&\textbf{0}&L&\mathbfcal{X}_{p}^{11}\\ \textbf{0}&-\mathfrak{X}^{22}&-\mathfrak{X}^{22}&\mathbf{0}\\ L^{\top}&-\mathfrak{X}^{22}&-L^{\top}\mathbfcal{X}^{12}-\mathbfcal{X}^{21}L-\mathbfcal{X}_{p}^{22}&-\mathbfcal{X}_{p}^{21}+\mathfrak{X}^{21}\\ \mathbfcal{X}_{p}^{11}&\mathbf{0}&-\mathbfcal{X}_{p}^{12}+\mathfrak{X}^{12}&\mathfrak{X}^{11}\end{bmatrix} (43)

IV-C Overall Process

Combining the above results, we provide the following unified theorem to outline the overall task of designing a dissipative spreading network.

Theorem 1

Given the node recovery rate information, intra-group interconnections and nominal inter-group interconnections, we can enforce the spreading network Σ\Sigma to be be 𝔛\mathfrak{X}-dissipative by designing the interconnection matrix barMbar{M} following the process outlined in Alg. 1.

Proof:

The proof is complete by noticing that each problem i,k\mathbb{P}_{i,k} is a joint version of LMI problems (34) and (40), each problem i\mathbb{P}_{i} is a joint version of LMI problems (35) and (41), and the problem \mathbb{P} is a combination pf the LMI problem (36) with consitraints (38), (39) and the objective (37). ∎

Algorithm 1 Spreading Network Design Process
1:Input: {(γ¯i,k,δi,k):kNi,iN}\{(\bar{\gamma}_{i,k},\delta_{i,k}):k\in\mathbb{N}_{N_{i}},i\in\mathbb{N}_{N}\}, {Mii:iN}\{M_{ii}:i\in\mathbb{N}_{N}\}, M¯0\bar{M}_{0}
2:for i=1,2,,Ni=1,2,\ldots,N do \triangleright Analyzing Groups
3:  for k=1,2,,Nik=1,2,\ldots,N_{i} do \triangleright Analyzing Nodes
4:   Find Xi,kX_{i,k} (and 𝒳¯i,k\bar{\mathcal{X}}_{i,k}) via solving i,k\mathbb{P}_{i,k} (44).
5:  end for
6:  Find 𝒳i\mathcal{X}_{i} (and 𝔛¯i,k\bar{\mathfrak{X}}_{i,k}) via solving the problem i\mathbb{P}_{i} (45).
7:end for
8:Find M¯\bar{M}, 𝔛\mathfrak{X} via solving the problem \mathbb{P} (46).

Problem i,k\mathbb{P}_{i,k}

Find: p,a,b,c,a¯,b¯,c¯,\displaystyle\ p,\ a,\,b,\,c,\,\bar{a},\,\bar{b},\,\bar{c}, (44)
Sub. to: p>0,Φ~i,k>0,\displaystyle\ p>0,\,\tilde{\Phi}_{i,k}>0,
{a0,(2bp)0,(c+p(γ¯i,kδi,k))0,ora>0,b0,[abbc+p(γ¯i,kδi,k)]0.\begin{cases}a\geq 0,\ (2b-p)\geq 0,\ (c+p(\bar{\gamma}_{i,k}-\delta_{i,k}))\geq 0,\ \mbox{or}\\ a>0,\ b\leq 0,\ \begin{bmatrix}a&b\\ b&c+p(\bar{\gamma}_{i,k}-\delta_{i,k})\end{bmatrix}\geq 0.\end{cases}
Φ~i,k[a0ama0c¯c¯0amc¯2bmcb+b¯a0b+b¯a¯],\tilde{\Phi}_{i,k}\triangleq\begin{bmatrix}a&0&a\,m&a\\ 0&-\bar{c}&-\bar{c}&0\\ a\,m&-\bar{c}&-2b\,m-c&-b+\bar{b}\\ a&0&-b+\bar{b}&\bar{a}\end{bmatrix},

Problem i\mathbb{P}_{i}

Find: 𝒳i,𝔛¯i,{pi,k:kNi}\displaystyle\ \mathcal{X}_{i},\ \bar{\mathfrak{X}}_{i},\ \{p_{i,k}:k\in\mathbb{N}_{N_{i}}\} (45)
Sub. to: pi,k>0,kNi,Φi>0,Φ~i>0,\displaystyle\ p_{i,k}>0,\ \forall k\in\mathbb{N}_{N_{i}},\ \Phi_{i}>0,\ \tilde{\Phi}_{i}>0,
Φ~i[𝒳i11𝟎𝟎𝒳i11𝟎𝔛¯i22𝔛¯i22𝟎𝟎𝔛¯i22𝒳i22𝒳i21+𝔛¯i21𝒳i11𝟎𝒳i12+𝔛¯i12𝔛¯i11],\tilde{\Phi}_{i}\triangleq\begin{bmatrix}\mathcal{X}_{i}^{11}&\mathbf{0}&\mathbf{0}&\mathcal{X}_{i}^{11}\\ \mathbf{0}&-\bar{\mathfrak{X}}^{22}_{i}&-\bar{\mathfrak{X}}^{22}_{i}&\mathbf{0}\\ \mathbf{0}&-\bar{\mathfrak{X}}^{22}_{i}&-\mathcal{X}_{i}^{22}&-\mathcal{X}_{i}^{21}+\bar{\mathfrak{X}}^{21}_{i}\\ \mathcal{X}_{i}^{11}&\mathbf{0}&-\mathcal{X}_{i}^{12}+\bar{\mathfrak{X}}^{12}_{i}&\bar{\mathfrak{X}}^{11}_{i}\end{bmatrix},

where Φi\Phi_{i} is as defined in (42).

Problem \mathbb{P}

minL,𝔛,{pi:iN}\displaystyle\min_{\begin{subarray}{c}L,\mathfrak{X},\\ \{p_{i}:i\in\mathbb{N}_{N}\}\end{subarray}} J=L𝓧𝓜¯+α𝓧+β𝒳,\displaystyle\ J=\|L-\mathbfcal{X}_{p}^{11}\bar{M}_{0}\|+\alpha\|\mathbfcal{X}_{p}^{11}\|+\beta\|\mathfrak{X}\|, (46)
Sub. to: pi>0,iN,Φ>0\displaystyle p_{i}>0,\ \forall i\in\mathbb{N}_{N},\ \Phi>0
[𝐈Y𝟎Y𝓧𝓨+𝓨𝓧L𝓧𝓜¯𝟎LM¯0𝓧δ2M¯0M¯0]0,\displaystyle\ \begin{bmatrix}\mathbf{I}&Y^{\top}&\mathbf{0}\\ Y&\mathbfcal{X}_{p}^{11}Y^{\top}+Y\mathbfcal{X}_{p}^{11}&L-\mathbfcal{X}_{p}^{11}\bar{M}_{0}\\ \mathbf{0}&L^{\top}-\bar{M}_{0}^{\top}\mathbfcal{X}_{p}^{11}&\delta^{2}\bar{M}_{0}^{\top}\bar{M}_{0}\end{bmatrix}\geq 0,
δ𝓧𝓜¯𝓛𝓧𝓜¯δ𝓧𝓜¯,\displaystyle\ -\delta\mathbfcal{X}_{p}^{11}\bar{M}_{0}\ll L-\mathbfcal{X}_{p}^{11}\bar{M}_{0}\ll\delta\mathbfcal{X}_{p}^{11}\bar{M}_{0},

where Φ\Phi is as defined in (43).

Remark 4

While we have only provided the theoretical result for the design of a dissipative spreading network, the same result can be used for dissipativity analysis of the spreading network given the inter-group interconnections. The approach is analogous to how we analyzed dissipativity of individual groups using the dissipativity-based topology design result in Pr. 2 at the group level given the intra-group interconnections.

Remark 5

The proposed framework’s ability to conduct both dissipativity analysis and dissipative design is beneficial as we can use it to reconfigure intra-group interconnections if a group is not sufficiently dissipative compromising the performance of the spreading network. Moreover, the same capability will play a major role when there are higher layers beyond the network level (e.g., a network of networks layer) in the considered spreading network.

V Simulation Results

To provide operational details and showcase the benefits of the proposed dissipativity-based spreading network design technique, we implement it along with several of its variants and two standard techniques for a randomly generated spreading network. In particular, we report the variation of the average infection level observed under different design methods over an extended period where different disturbances were injected into the spreading network. We also report the percentage reductions in the inter-group interconnections exercised by different design methods to measure the exerted spreading network design effort.

V-A Considered Spreading Network

As shown in Fig. 3(a)-3(b), the considered spreading network consists of four groups G1,G2,G3,G4G_{1},G_{2},G_{3},G_{4} with 5,6,7,45,6,7,4 nodes, respectively. The mean recovery rates (i.e., γ¯i,k\bar{\gamma}_{i,k}) for the nodes were selected from the uniform random distribution in the interval [0.4,0.9][0.4,0.9]. The recovery rate deviation bound (i.e., δi,k\delta_{i,k}) was set as 5%5\% of the selected recovery rate at each node. The initial infection level for each node was selected from the uniform random distribution in the interval [0,1][0,1].

The intra-group interconnections were created randomly with a probability of 0.30.3 for any node pair in a group, and the interconnection levels were selected from the uniform random distribution in the interval [0.1,0.4][0.1,0.4]. While we made no assumption regarding the group connectivity (like strong connectivity), we scaled down the intra-group interconnections to ensure group stability of the infections-free state when isolated from other groups. This scaling was done only to create an ideal reference behavior to compare with other spreading network design methods. On the other hand, the inter-group interconnections were created randomly with a probability of 0.20.2 for any node pair in the spreading network, and the interconnection levels were selected from the uniform random distribution in the internal [0.1,0.4][0.1,0.4] without any scaling.

The disturbance input (i.e., wi,k(t)w_{i,k}(t)) affecting each node was chosen to include four distinct components, each active during specific time windows and triggered asynchronously at different nodes: a brief, low-amplitude sinusoidal fluctuation during t[40,45]t\in[40,45], a step offset during t[80,85]t\in[80,85], a toggling component during t[120,130]t\in[120,130], and mild random noise added during t[0,160]t\in[0,160]. These short-lived perturbations combine to create a rich disturbance profile to evaluate the different design approaches.

We simulated this spreading network under different inter-group interconnection configurations given by different spreading network design methods, including the two cases where we used none of and all of the original inter-group interconnections. The observed variations of the average infection level (fraction) of the spreading network over a period t[0,200]t\in[0,200] are shown in Fig. 4. Notice that when no inter-group interconnections are used, by design, the spreading network stabilizes to the infections-free state very rapidly overcoming all disturbance conditions. However, when there are inter-group interconnections, the spreading network does not stabilize to the infections-free state. Hence these two average infections profiles provide the best and worst case scenarios for the spreading process to compare other spreading network design methods.

V-B Dissipativity-Based Design

We implemented the proposed dissipativity-based spreading network design method as follows. First, each node Σi,k,kNi,iN\Sigma_{i,k},k\in\mathbb{N}_{N_{i}},i\in\mathbb{N}_{N} was considered to be IF-OFP(ν,ρ\nu,\rho) (see Rm. 1), and hence, the problem i,k\mathbb{P}_{i,k} was solved by setting b=0.5b=0.5 and optimizing for decision variables aa and cc, representative of the passivity indices ν-\nu and ρ-\rho, respectively. As we plan to establish similar IF-OFP properties at the group level, in problem i,k\mathbb{P}_{i,k}, we also set b¯=0.5\bar{b}=0.5 and included a¯\bar{a} and c¯\bar{c} as decision variables. Overall, when solving the problem i,k\mathbb{P}_{i,k}, we optimize the objective function Ji,ka+c+a¯+c¯J_{i,k}\triangleq a+c+\bar{a}+\bar{c} to identify the maximum feasible node passivity indices while helping to establish similarly high passivity indices at the group level.

Next, each group Σi,iN\Sigma_{i},i\in\mathbb{N}_{N} was considered to have a vectored IF-OFP property, and hence the problem i\mathbb{P}_{i} was solved by setting 𝒳i12=0.5𝐈\mathcal{X}_{i}^{12}=0.5\mathbf{I} and optimizing for diagonal matrices (decision variables) 𝒳i11\mathcal{X}_{i}^{11} and 𝒳i22\mathcal{X}_{i}^{22}. As we plan to establish the network L2G(γ\gamma) (see Rm. 1), in problem i\mathbb{P}_{i}, we also set 𝔛¯i12=𝟎\bar{\mathfrak{X}}_{i}^{12}=\mathbf{0}, 𝔛¯i22=𝐈\bar{\mathfrak{X}}_{i}^{22}=-\mathbf{I} and 𝔛¯i11=γ¯i𝐈\bar{\mathfrak{X}}_{i}^{11}=\bar{\gamma}_{i}\mathbf{I} and include γ¯i\bar{\gamma}_{i} as a decision variable. Overall, when solving the problem i\mathbb{P}_{i}, we optimize the objective function Jitrace(𝒳i11)+trace(𝒳i22)+γ¯iJ_{i}\triangleq\mbox{trace}(\mathcal{X}_{i}^{11})+\mbox{trace}(\mathcal{X}_{i}^{22})+\bar{\gamma}_{i} to identify maximum feasible group passivity indices while helping to achieve lowest possible L2L_{2} gain values for the spreading network.

Finally, we set out to design the inter-group interconnections M¯\bar{M} in the spreading network Σ\Sigma to make it L2G(γ\gamma), i.e., finite-gain L2L_{2} stable with a gain γ\gamma. For this, the problem \mathbb{P} was solved by setting 𝔛12=𝟎\mathfrak{X}^{12}=\mathbf{0}, 𝔛22=𝐈\mathfrak{X}^{22}=-\mathbf{I} and 𝔛11=γ¯𝐈\mathfrak{X}^{11}=\bar{\gamma}\mathbf{I}, and optimizing for M¯\bar{M} and γ¯\bar{\gamma} as decision variables. In particular, when solving problem \mathbb{P}, we optimized the objective function:

J=cML𝓧𝓜¯+γ¯J=c_{M}\|L-\mathbfcal{X}_{p}^{11}\bar{M}_{0}\|_{1}+\bar{\gamma}

subject to a limit δM\delta_{M} on the fractional deviation allowed for the magnitude of any inter-group interconnection level, i.e.,

(1δM)M¯0<<M¯(1δM)𝓧𝓜¯<<𝓛.(1-\delta_{M})\bar{M}_{0}<<\bar{M}\iff(1-\delta_{M})\mathbfcal{X}_{p}^{11}\bar{M}_{0}<<L.

In the baseline dissipativity-based design approach, we used the problem parameters cM=1c_{M}=1 and δM=1\delta_{M}=1. For comparison purposes, we also evaluate the dissipativity-based design for cM{109,109}c_{M}\in\{10^{-9},10^{9}\} (effectively, cM{0,}c_{M}\in\{0,\infty\}) and δM{0.9,0.95}\delta_{M}\in\{0.9,0.95\}. Henceforth, these dissipativity-based methods are denoted as DissBC(cM,δMc_{M},\delta_{M}), e.g., the baseline dissipativity-based method is denoted as DisBC(1,11,1).

V-C Threshold and Degree Based Methods

To compare the performance of the dissipativity-based spreading network designs, we also examine two basic, practical spreading network design methods (see also [6]). The first approach prunes inter-group interconnections with weights beyond a given threshold tMt_{M}. By removing the strongest inter-group links, this method reduces the most impactful pathways for disease propagation. Henceforth, this threshold-based approach is denoted as TBC(tMt_{M}). The second approach identifies the top dMd_{M} fraction of the nodes in terms of their inter-group out-degree and removes all their outgoing connections to nodes in other groups. By isolating these highly connected nodes, this method limits the spread of epidemics through critical inter-group links. Henceforth, this degree-based approach is denoted as DegBC(tMt_{M}).

To make the comparison of different spreading network design methods fair, we first identified a “design effort” metric:

JMi,jN,ij,kNi,lNjM¯0ij,klM¯ij,klM¯0ij,klJ_{M}\triangleq\sum_{\begin{subarray}{c}\forall i,j\in\mathbb{N}_{N},i\neq j,\\ \forall k\in\mathbb{N}_{N_{i}},l\in\mathbb{N}_{N_{j}}\end{subarray}}\frac{\bar{M}_{0}^{ij,kl}-\bar{M}^{ij,kl}}{\bar{M}_{0}^{ij,kl}}

representing the average fractional cutdown of the interconnections, observed under each method. The baseline DissBC(1,11,1) method observed an average fractional cutdown of Jc=87.1%J_{c}=87.1\%, and hence the parameters tMt_{M} and dMd_{M} respectively of TBC(tMt_{M}) and DegBC(dMd_{M}) methods were tuned to achieve the similar JMJ_{M} level. The resulting parameters were tM=0.18t_{M}=0.18 and dM=0.72d_{M}=0.72.

V-D Results

Based on the reported average infection levels in Fig. 4, the baseline DissBC(1,11,1) method provided the closest behavior to the best case (i.e., the case without interconnections). The TBC(0.180.18) and DegBC(0.720.72) methods while achieved stability, were considerably slow to respond to various disturbances. This effectiveness of the proposed DissBC(1,11,1) method can be attributed to the systematic dynamics-aware LMI-based design process, which optimally tailors the inter-group interconnections while optimizing the a robust stability measure.

As stated in Rm. 4, the proposed dissipativity-based spreading networks design approach can also be used to analyze the dissipativity of a given spreading network. Consequently, it can be used to analyze the L2L_{2} gain level γ\gamma of any given spreading network. We used this γ\gamma level as a performance metric besides the time-averaged infection level (fraction)

Jx1T0Tx(t)𝑑t,J_{x}\triangleq\frac{1}{T}\int_{0}^{T}x(t)dt,

and the average interconnection reductions fraction JMJ_{M} as measures of performance when comparing different spreading network design methods. The observed performance metrics are summarized in Tab. I.

Based on Tab. I, it is clear that the dissipativity-based spreading network design have superior (i.e., lower) L2L_{2} gain γ\gamma levels compared to other methods. In particular, DissBC(109,110^{-}9,1) (i.e., when cM=109c_{M}=10^{-9} and thus, when the design objective is effectively γ\gamma) has obtained the lowest γ\gamma value, at γ=24.10\gamma=24.10. Interestingly, as can be seen in Figs. 5(a) and 5(c), the average reduction of interconnections in this DissBC(109,110^{-9},1) case is also the lowest, at JM=0.8168J_{M}=0.8168. This implies that it is not necessary to reduce interconnections significantly to obtain guaranteed theoretical robust stability measures.

Based on both Fig. 4 and Tab. I, dissipativity based spreading network design methods also have superior experimental average infections level performance (i.e., lower JxJ_{x} metrics). In particular, DissBC(109,110^{9},1) (i.e., when cM=109c_{M}=10^{9} and thus when the design objective is effectively the interconnections) has obtained the lowered JxJ_{x} value, at Jx=0.0638J_{x}=0.0638. This is because, due to its focus on optimizing only the interconnections, the solution has drastically cutdown interconnections. This behavior is evident from Figs. 5(b) and 5(d) and also from the fact that this method achieves the highest JMJ_{M} values, at JM=0.9575J_{M}=0.9575.

As shown in Fig. 6, in dissipativity based designs, by reducing the δM\delta_{M} parameter from 11 to 0.950.95 and 0.90.9 (enforcing stricter constraints on interconnection deviations), DissBC(1,0.951,0.95) and Diss(1,0.91,0.9) methods have sacrificed both experimental performance JxJ_{x} and theoretical performance γ\gamma.

Considering these behaviors, it is clear that the selected baseline dissipativity-based design approach DissBC(1,11,1) considers a moderate case where both the robust stability measure γ\gamma and interconnection cost are treated equally, without forced constraints of interconnection deviations. As can be seen in Fig. 3(c) and 3(d), this leads to a spreading network with a close to the best: (i) robust stability guarantee with γ=24.15\gamma=24.15, (ii) experimental performance Jx=0.0380J_{x}=0.0380, and (iii) interconnection reductions JM=0.8710J_{M}=0.8710 highlighting the benefit of co-designing networks while using a well-balanced multiple objective function.

Overall, the results indicate that the proposed dissipativity-based approach provides a structured and efficient means of spreading networks. Its robustness against asynchronous disturbances while using specifically designed minimal alterations to the nominal network further highlights its suitability for practical applications where system dynamics are complex and uncertain.

Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Refer to caption
(d)
Figure 3: Considered spreading network: (a) without and (b) with inter-group interconnections. Proposed dissipativity-based design DissBC(1,11,1): (c) interconnection topology and (d) histogram of percentage interconnection reductions.
Refer to caption
Figure 4: Time evolution of average infection levels over the spreading network under different inter-group interconnection configurations: (1) No interconnections (blue), (2) Original uncontrolled network (orange), (3) Dissipativity-based design (magenta), (4) Threshold-based design (yellow), and (5) Degree-based design (green).
Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Refer to caption
(d)
Figure 5: Spreading network designs (top row) and their percentage interconnection reductions histograms (bottom row) observed under the proposed dissipativity-based design approach with parameters cM=109c_{M}=10^{-9} (left column) and cM=109c_{M}=10^{9} (right column) with δM=1\delta_{M}=1.
Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Refer to caption
(d)
Figure 6: Spreading network designs (top row) and their percentage interconnection reductions histograms (bottom row) observed under the proposed dissipativity-based design approach with parameters cM=1c_{M}=1 with δM=0.95\delta_{M}=0.95 (left column) and δM=0.9\delta_{M}=0.9 (right column).
Refer to caption
(a)
Refer to caption
(b)
Figure 7: Spreading network designs observed under: (a) threshold-based approach with the threshold parameter tM=0.18t_{M}=0.18 and (b) degree-based approach with the degree parameter dM=0.72d_{M}=0.72
TABLE I: Observed performance metrics: JxJ_{x} (average infections), JMJ_{M} (average reductions), and γ\gamma (L2L_{2}-gain) under different spreading network design techniques.
Design Method JxJ_{x} JMJ_{M} γ\gamma
Without interconnections 0.0616 1.0000 -
With Interconnections 0.3603 0.0000 -
DissBC(1,11,1) 0.0680 0.8710 24.15
DissBC(1,0.951,0.95) 0.0645 0.9497 26.16
DissBC(1,0.91,0.9) 0.0677 0.9000 35.08
DissBC(109,110^{-9},1) 0.0709 0.8168 24.10
DissBC(109,110^{9},1) 0.0638 0.9575 30.70
TBC(0.180.18) 0.0700 0.8726 -
DegBC(0.720.72) 0.0730 0.8854 249.6

VI Conclusion

In this paper, we presented a dissipativity-based framework for controlling epidemic spreading over networked systems. By formulating the control problem using dissipativity theory, we established a systematic method for designing inter-group interconnections that ensure stability and robustness against disturbances. Comparative analysis with traditional control techniques, including threshold pruning and high-degree edge removal, demonstrates the superior performance of the proposed approach in reducing infection levels with lower control effort. Future work includes extending the framework to account for adaptive or time-varying networks and exploring its application to other spreading processes beyond epidemic control.

References

  • [1] E. D. Sontag and Y. Wang, “On Characterizations of the Input-to-State Stability Property,” Systems & Control Letters, vol. 24, no. 5, pp. 351–359, 1995.
  • [2] S. Welikala, H. Lin, and P. J. Antsaklis, “Non-Linear Networked Systems Analysis and Synthesis using Dissipativity Theory,” in Proc. of American Control Conf., 2023, pp. 2951–2956.
  • [3] ——, “On-line Estimation of Stability and Passivity Metrics,” in Proc. of 61st IEEE Conf. on Decision and Control, 2022, pp. 267–272.
  • [4] ——, “A Decentralized Analysis and Control Synthesis Approach for Networked Systems with Arbitrary Interconnections,” IEEE Trans. on Automatic Control, no. 0018-9286, 2024.
  • [5] M. Mirabilio, A. Iovine, E. De Santis, M. D. D. Benedetto, and G. Pola, “Scalable Mesh Stability of Nonlinear Interconnected Systems,” IEEE Control Systems Letters, vol. 6, pp. 968–973, 2022.
  • [6] Y. Yi, L. Shan, P. E. Paré, and K. H. Johansson, “Edge Deletion Algorithms for Minimizing Spread in SIR Epidemic Models,” arXiv e-prints, p. 2011.11087, 2020. [Online]. Available: http://arxiv.org/abs/2011.11087