Springer Proceedings in Mathematics & Statistics Volume 20
For further volumes: http://www.springer.com/series/10533
...

This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below!

Springer Proceedings in Mathematics & Statistics Volume 20

For further volumes: http://www.springer.com/series/10533

Springer Proceedings in Mathematics & Statistics

This book series will feature volumes of selected contributions from workshops and conferences in all areas of current research activity in mathematics and statistics, operations research and optimization. In addition to an overall evaluation of the interest, scientific quality, and timeliness of each proposal at the hands of the publisher, every individual contribution is refereed to standards comparable to those of leading journals in the field. This expanded series thus proposes to the research community well-edited and authoritative reports on newest developments in the most interesting and promising areas of mathematical and statistical research today.

Alexey Sorokin • Robert Murphey • My T. Thai Panos M. Pardalos Editors

Dynamics of Information Systems: Mathematical Foundations

123

Editors Alexey Sorokin Industrial and Systems Engineering University of Florida Gainesville, FL USA

Robert Murphey Air Force Research Lab Munitions Directorate Eglin Air Force Base, FL USA

My T. Thai Department of Computer and Information Science and Engineering University of Florida Gainesville, FL USA

Panos M. Pardalos Center for Applied Optimization Industrial and Systems Engineering University of Florida Gainesville, FL USA Laboratory of Algorithms and Technologies for Networks Analysis (LATNA) National Research University Higher School of Economics Moscow, Russia

ISBN 978-1-4614-3905-9 ISBN 978-1-4614-3906-6 (eBook) DOI 10.1007/978-1-4614-3906-6 Springer New York Heidelberg Dordrecht London Library of Congress Control Number: 2012939429 © Springer Science+Business Media New York 2012 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface

Information systems have become an inevitable part of contemporary society and affect our lives every day. With rapid development of the technology, it is crucial to understand how information, usually in the form of sensing and control, influences the evolution of a distributed or networked system, such as social, biological, genetic, and military systems. The dynamic aspect of information fundamentally describes the potential influence of information on the system and how that information flows through the system and is modified in time and space. Understanding this dynamics will help to design a high-performance distributed system for real-world applications. One notable example is the integration of sensor networks and transportation where the traffic and vehicles are continuously moving in time and space. Another example would be applications in the cooperative control systems, which have a high impact on our society, including robots operating within a manufacturing cell, unmanned aircraft in search and rescue operations or military surveillance and attack missions, arrays of microsatellites that form distributed large aperture radar, or employees operating within an organization. Therefore, concepts that increase our knowledge of the relational aspects of information as opposed to the entropic content of information will be the focus of the study of information systems dynamics in the future. This book presents the state of the art relevant to the theory and practice of the dynamics of information systems and thus lays a mathematical foundation in the field. The first part of the book provides a discussion about evolution of information in time, adaptation in a Hamming space, and its representation. This part also presents an important problem of optimization of information workflow with algorithmic approach, as well as integration principle as the master equation of the dynamics of information systems. A new approach for assigning task difficulty for operators during multitasking is also presented in this part. Second part of the book analyzes critical problems of information in distributed and networked systems. Among the problems discussed in this part are sensor scheduling for space object tracking, randomized multidimensional assignment, as well as various network problems and solution approaches. The dynamics of climate networks and complex network models are also discussed in this part. The third part of the book v

vi

Preface

provides game-theoretical foundations for dynamics of information systems and considers the role of information in differential games, cooperative control, protocol design, and leader with multiple followers games. We gratefully acknowledge the financial support of the Air Force Research Laboratory and the Center for Applied Optimization at the University of Florida. We thank all the contributing authors and the anonymous referees for their valuable and constructive comments that helped to improve the quality of this book. Furthermore, we thank Springer Publisher for making the publication of this book possible. Gainesville, FL, USA

Alexey Sorokin Robert Murphey My T. Thai Panos M. Pardalos

Contents

Part I

Evolution and Dynamics of Information Systems

Dynamics of Information and Optimal Control of Mutation in Evolutionary Systems .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . Roman V. Belavkin

3

Integration Principle as the Master Equation of the Dynamics of an Information System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . Victor Korotkikh and Galina Korotkikh

23

On the Optimization of Information Workflow . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . Michael J. Hirsch, H´ector Ortiz-Pe˜na, Rakesh Nagi, Moises Sudit, and Adam Stotz Characterization of the Operator Cognitive State Using Response Times During Semiautonomous Weapon Task Assignment . . . . . Pia Berg-Yuen, Pavlo Krokhmal, Robert Murphey, and Alla Kammerdiner Correntropy in Data Classification.. . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . Mujahid N. Syed, Jose C. Principe, and Panos M. Pardalos Part II

43

67

81

Dynamics of Information in Distributed and Networked Systems

Algorithms for Finding Diameter-constrained Graphs with Maximum Algebraic Connectivity . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 121 Harsha Nagarajan, Sivakumar Rathinam, Swaroop Darbha, and Kumbakonam Rajagopal Robustness and Strong Attack Tolerance of Low-Diameter Networks . . . . 137 Alexander Veremyev and Vladimir Boginski

vii

viii

Contents

Dynamics of Climate Networks .. . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 157 Laura C. Carpi, Patricia M. Saco, Osvaldo A. Rosso, and Mart´ın G´omez Ravetti Sensor Scheduling for Space Object Tracking and Collision Alert .. . . . . . . . 175 Huimin Chen, Dan Shen, Genshe Chen, and Khanh Pham Throughput Maximization in CSMA Networks with Collisions and Hidden Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 195 Sankrith Subramanian, Eduardo L. Pasiliao, John M. Shea, Jess W. Curtis, and Warren E. Dixon Optimal Formation Switching with Collision Avoidance and Allowing Variable Agent Velocities . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 207 Dalila B.M.M. Fontes, Fernando A.C.C. Fontes, and Am´elia C.D. Caldeira Computational Studies of Randomized Multidimensional Assignment Problems .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 225 Mohammad Mirghorbani, Pavlo Krokhmal, and Eduardo L. Pasiliao On Some Special Network Flow Problems: The Shortest Path Tour Problems .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 245 Paola Festa Part III

Game Theory and Cooperative Control Foundations for Dynamics of Information Systems

A Hierarchical MultiModal Hybrid Stackelberg–Nash GA for a Leader with Multiple Followers Game . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 267 Egidio D’Amato, Elia Daniele, Lina Mallozzi, Giovanni Petrone, and Simone Tancredi The Role of Information in Nonzero-Sum Differential Games.. . . . . . . . . . . . . 281 Meir Pachter and Khanh Pham Information Considerations in Multi-Person Cooperative Control/Decision Problems: Information Sets, Sufficient Information Flows, and Risk-Averse Decision Rules for Performance Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 305 Khanh D. Pham and Meir Pachter Modeling Interactions in Complex Systems: Self-Coordination, Game-Theoretic Design Protocols, and Performance Reliability-Aided Decision Making. . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 329 Khanh D. Pham and Meir Pachter

Contributors

Roman V. Belavkin Middlesex University, London, UK Pia Berg-Yuen Air Force Research Lab, Munitions Directorate, Eglin AFB, FL, USA Vladimir Boginski Department of Industrial and Systems Engineering, University of Florida, Shalimar, FL, USA Am´elia C.D. Caldeira Departamento de Matem´atica, Instituto Superior de Engenharia do Porto, Porto, Portugal Laura C. Carpi Civil, Surveying and Environmental Engineering, The University of Newcastle, New South Wales, Australia, Departamento de F´ısica, Universidade Federal de Minas Gerais, Belo Horizonte, Brazil Genshe Chen I-Fusion Technology, Inc., Germantown, MD, USA Huimin Chen University of New Orleans, Department of Electrical Engineering, New Orleans, LA, USA Jess W. Curtis Munitions Directorate, Air Force Research Laboratory, Eglin AFB, FL, USA Egidio D’Amato Dipartimento di Scienze Applicate, Universit`a degli Studi di Napoli “Parthenope”, Centro Direzionale di Napoli, Napoli, Italy Elia Daniele Dipartimento di Ingegneria Aerospaziale, Universit`a degli Studi di Napoli “Federico II”, Napoli, Italy Swaroop Darbha Department of Mechanical Engineering, Texas A&M University, College Station, TX, USA Warren E. Dixon Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA Paola Festa Department of Mathematics and Applications, University of Napoli FEDERICO II, Compl. MSA, Napoli, Italy ix

x

Contributors

Dalila B.M.M. Fontes LIAAD - INESC Porto L.A. and Faculdade de Economia, Universidade do Porto, Porto, Portugal Fernando A.C.C. Fontes ISR Porto and Faculdade de Engenharia, Universidade do Porto, Porto, Portugal Michael J. Hirsch Raytheon Company, Intelligence and Information Systems, Annapolis Junction, MD, USA Alla Kammerdiner New Mexico State University, Las Cruces, NM, USA Galina Korotkikh School of Information and Communication Technology, CQUniversity, Mackay, Queensland, Australia Victor Korotkikh School of Information and Communication Technology, CQUniversity, Mackay, Queensland, Australia Pavlo Krokhmal Department of Mechanical and Industrial Engineering, University of Iowa, Iowa City, IA, USA Lina Mallozzi Dipartimento di Matematica e Applicazioni, Universit`a degli Studi di Napoli “Federico II”, Napoli, Italy Mohammad Mirghorbani Department of Mechanical and Industrial Engineering, University of Iowa, Iowa City, IA, USA Robert Murphey Air Force Research Lab, Munitions Directorate, Eglin AFB, FL, USA Harsha Nagarajan Department of Mechanical Engineering, Texas A&M University, College Station, TX, USA Rakesh Nagi University at Buffalo, Department of Industrial and Systems Engineering, Buffalo, NY, USA ˜ CUBRC, Buffalo, NY, USA H´ector Ortiz-Pena Meir Pachter Air Force Institute of Technology, AFIT, Wright Patterson AFB, OH, USA Panos M. Pardalos Department of Industrial and Systems Engineering, University of Florida, Gainesville, FL, USA Eduardo L. Pasiliao Munitions Directorate, Air Force Research Laboratory, Eglin AFB, FL, USA Giovanni Petrone Dipartimento di Ingegneria Aerospaziale, Universit`a degli Studi di Napoli “Federico II”, Napoli, Italy Khanh Pham Air Force Research Laboratory, Space Vehicles Directorate, Kirtland Air Force Base, NM, USA Jose C. Principe Computational NeuroEngineering Laboratory, University of Florida, Gainesville, FL, USA

Contributors

xi

Kumbakonam Rajagopal Department of Mechanical Engineering, Texas A&M University, College Station, TX, USA Sivakumar Rathinam Department of Mechanical Engineering, Texas A&M University, College Station, TX, USA Mart´ın G´omez Ravetti Departamento de Engenharia de Produc¸a˜ o, Universidade Federal de Minas Gerais, Belo Horizonte, Brazil Osvaldo A. Rosso Chaos & Biology Group, Instituto de C´alculo, Universidad de Buenos Aires, Argentina, Departamento de F´ısica, Universidade Federal de Minas Gerais, Universidade Federal de Minas Gerais, Belo Horizonte, Brazil Patricia M. Saco Civil, Surveying and Environmental Engineering, The University of Newcastle, New South Wales, Australia John M. Shea Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA Dan Shen I-Fusion Technology, Inc., Germantown, MD, USA Adam Stotz CUBRC, Buffalo, NY, USA Sankrith Subramanian Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA Moises Sudit CUBRC, Buffalo, NY, USA Mujahid N. Syed Department of Industrial and Systems Engineering, University of Florida, Gainesville, FL, USA Simone Tancredi Dipartimento di Ingegneria Aerospaziale, Universit`a degli Studi di Napoli “Federico II”, Napoli, Italy Alexander Veremyev Department of Industrial and Systems Engineering, University of Florida, Gainesville, FL, USA

Part I

Evolution and Dynamics of Information Systems

Dynamics of Information and Optimal Control of Mutation in Evolutionary Systems Roman V. Belavkin

Abstract Evolutionary systems are used for search and optimization in complex problems and for modelling population dynamics in nature. Individuals in populations reproduce by simple mechanisms, such as mutation or recombination of their genetic sequences, and selection ensures they evolve in the direction of increasing fitness. Although successful in many applications, evolution towards an optimum or high fitness can be extremely slow, and the problem of controlling parameters of reproduction to speed up this process has been investigated by many researchers. Here, we approach the problem from two points of view: (1) as optimization of evolution in time; (2) as optimization of evolution in information. The former problem is often intractable, because analytical solutions are not available. The latter problem, on the other hand, can be solved using convex analysis, and the resulting control, optimal in the sense of information dynamics, can achieve good results also in the sense of time evolution. The principle is demonstrated on the problem of optimal mutation rate control in Hamming spaces of sequences. To facilitate the analysis, we introduce the notion of a relatively monotonic fitness landscape and obtain general formula for transition probability by simple mutation in a Hamming space. Several rules for optimal control of mutation are presented, and the resulting dynamics are compared and discussed. Keywords Fitness • Information • Hamming space • Mutation rate • Optimal evolution

R.V. Belavkin () Middlesex University, London NW4 4BT, UK e-mail: [email protected] A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 1, © Springer Science+Business Media New York 2012

3

4

R.V. Belavkin

1 Introduction Dynamical systems have traditionally been considered as time evolution using mathematical models based on Markov processes and corresponding differential equations. These methods achieved tremendous success in many applications, particularly in optimal estimation and control of linear and some non-linear systems [6,12,18]. Markov processes have also been applied in studies of learning [11,20,21] and evolutionary systems [2, 14, 22]. Their optimization, however, is complicated for several reasons. One of them is that the relation between available controls and values of an objective function is not well defined or uncertain. Another is an incredible complexity associated with their optimization. The first difficulty can be sometimes overcome either by defining and analysing the underlying structure of the system or by learning the relationships between the controls and objective function from data. Here, we take the former approach. We first outline some general principles by relating a topology of the system to the objective function. Then we consider probability of simple mutation of sequences in a Hamming space, and derive expressions for its relation to values of a fitness function. The resulting system, however, although completely defined, quickly becomes intractable for optimization of its evolution in time using traditional methods with the exception of a few special cases. Evolution of dynamical systems can be considered from another point of view as evolution in information. In fact, dynamic information is one of the main characteristics of learning and evolutionary systems. Information dynamics can be understood simply as changes of information distance between states, represented by probability measures on a phase space. Although optimality with respect to information has been studied in theories of information utility [19] and information geometry [1, 8], there were few attempts to integrate information dynamics in synthesis of optimal control of dynamical systems [3–5, 7]. Understanding better the relation between optimality with respect to time and information criteria has been the main motivation for this work. In the next section, we formulate and consider problems of optimization of evolution in time and in information. Then we consider evolution of a discrete system of sequences and derive relevant expressions for optimization of their position in a Hamming space. Special cases will be considered in Sect. 4 to derive several control functions for mutation rate and evaluate their performance. Then we shall summarize and discuss the results.

2 Evolution in Time and Information Let ˝ be the set of elementary events and f W ˝ ! R be an objective function. An evolution of a system is represented by a sequence !0 ; !1 ; : : : ; !t ; : : : of events, indexed by time, and we shall consider a control problem optimizing the evolution

Dynamics of Information and Optimal Control of Mutation

5

with respect to the objective function. For simplicity, we shall assume that ˝ is countable or even a finite set, so that there is at most a countable or finite number of values x D f .!/. This is because we focus in this paper on applications of such problems to biological or evolutionary systems. In this context, ˝ represents the set of all possible individual organisms (e.g. the set of all DNA sequences), and f is called a fitness function. The sequence f!t g represents descendants of !0 in t 0 generations. Fitness function represents (or induces) a total pre-order . on ˝: a . b if and only if f .a/ f .b/. It factorizes ˝ into the equivalence classes of fitness: Œx WD f! 2 ˝ W f .!/ D xg : Thus, from the point of optimization of fitness f , sequences !0 ; : : : ; !t ; : : : corresponding to the same sequence x0 ; : : : ; xt ; : : : of fitness values are equivalent. Equivalent evolutions are represented by the real stochastic process fxt g of fitness values.

2.1 Optimization of Evolution in Time Let P .xsC1 j xs / be the conditional probability of an offspring having fitness value xsC1 D f .!sC1 / given that its parent had fitness value xs D f .!s /. This Markov probability can be represented by a left stochastic matrix T , and if transition probabilities P .xsC1 j xs / do not depend on s, then T defines a stationary (or timehomogeneous) Markov process xt . In particular, T t defines a linear transformation of distribution ps WD P .xs / of fitness values at time s into distribution psCt WD P .xsCt / of fitness values after t 0 generations: X psC1 D Tps D P .xsC1 j xs / P .xs / ; ) psCt D T t ps : xs 2f .˝/

The expected fitness of the offspring after t generations is X EfxsCt g WD xsCt P .xsCt /: xsCt 2f .˝/

We say that individuals adapt if and only if EfxsCt g Efxs g. Suppose that the transition probability P .xsC1 j xs / depends on a control parameter , so that the Markov operator T.x/ depends on the control function .x/. Then the expected fitness E.x/ fxsCt g also depends on .x/. In the context of biological or evolutionary systems, can be related to a reproduction strategy, which involves mutation and recombination of DNA sequences. The optimal control should maximize expected fitness of the offspring to achieve maximum or fastest adaptation. This problem, however, can be formulated and solved in different ways.

6

R.V. Belavkin

Optimality at a certain generation is defined by the following (instantaneous) optimal value function: f ./ WD supfE.x/ fxsCt g W t g:

(1)

.x/

Here, 0 represents a time constraint. Function f ./ is non-decreasing, and optimization problem (1) has dual representation by the inverse function f

1

./ WD inf ft 0 W E.x/ fxsCt g g: .x/

(2)

Here, is a constraint on the expected fitness at s C t. Thus, f ./ is defined as 1 the maximum adaptation in no more than generations; f ./ is defined as the minimum number of generations required to achieve adaptation . Observe that f ./ can in general have infinite values, and we can define f .1/ WD sup f .!/. 1 However, f .sup f .!// 1. Observe that optimal solutions .x/ to problems (1) or (2) depend on the constraints or (and on the initial distribution ps via T t ps D psCt ). If the objective is to derive one optimal function .x/ that can be used throughout the entire “evolution” Œs; s C t, then one can define another (cumulative) optimal value function t X F .s; t/ WD sup E.x/ fxsC g: (3) .x/ D0

This optimization problem can be formulated as a recursive series of one-step maximizations using the dynamic programming approach [6]. Also, using definitions (1) and (3), one can easily show the following inequality: F .s; t/

t X

f ./:

Ds

Given a control function .x/ and the corresponding operator T.x/ , one can compute E.x/ fxsCt g for any fitness function f .!/ and initial distribution ps WD P .xs / of its values. Observe also that this formulation uses only the values of fitness, and therefore function f .!/ may change on Œs; s C t. Solving optimization problems (1) and (3), however, is not as straightforward, because it requires the inversion of the described computations. Because we are interested in optimal as a function of xs , we can take ps D ıxs .x/, and the optimal function .x/ is given by maximizing conditional expectation E fxsCt j xs g for each xs . When P .xsCt j xs / depends sufficiently smoothly on , the necessary condition of optimality in problems (1) or (2) can be expressed using conditional expectations for each xs : d E fxsCt j xs g D d

X xsCt 2f .˝/

xsCt

d P .xsCt j xs / D 0: d

(4)

Dynamics of Information and Optimal Control of Mutation

7

If E.x/ fxt Cs g is a concave functional of .x/, then the above condition is also sufficient. In addition, if the optimal value function f ./ is strictly increasing, then t D . Unfortunately, in the general case, analytical expressions are either not available or are extremely complex, and only approximate solutions can be obtained using numerical or evolutionary techniques. One useful technique is based on absorbing Markov chains and minimization of their convergence time. Recall that a Markov chain is called absorbing if P .xsC1 D j xs D / D 1 for some states . Such states are also called absorbing, while other states are called transient. If there are n absorbing and l transient states, then the corresponding right stochastic matrix T 0 (transposed of T ) can be written in the canonical form to compute its fundamental matrix N : In 0 ; N D .Il Q/1 : T0 D RQ Here, In is the n n identity matrix representing transition probabilities between absorbing states; Q is the l l matrix of transition probabilities between transient states; R is the l n matrix of transition probabilities from transient to absorbing states; 0 is the nl matrix of zeros (probabilities of escaping from absorbing states). The sum ofP elements nij of the fundamental matrix N in i th row gives the expected time ti D j nij before the process converges into an absorbing state starting in state i . Thus, given distribution ps WD P .i / of states at time moment s, the expected time to converge into any absorbing state can be computed as follows: Eftg D

l X i D1

ti P .i / D

l l X X

nij P .i /:

(5)

i D1 j D1

The quantity above can facilitate numerical solutions to problem (1). Indeed, this problem is represented dually by problem (2) with constraint EfxsCt g , and one can assume states x as absorbing. Then, given control function .x/ and corresponding operator T.x/ , one can compute the expected time E.x/ ftg of convergence into the absorbing states. For example, we shall consider E.x/ ftg for a single absorbing state D sup f .!/. Minimization of E.x/ ftg over some family of control functions .x/ can be performed numerically.

2.2 Optimal Evolution in Information We have considered evolution on ˝ as transformations T t W ps 7! T t ps of probability measures ps WD P .x/ on values x D f .!/. These transformations are endomorphisms T t W P.X / ! P.X / of the simplex P.X / WD fp 2 M.X / W p 0 ; kpk1 D 1g

8

R.V. Belavkin

of all probability measures p WD P .x/ on X D f .˝/. Here, M.X / is the Banach space P of all real Radon measures with the norm of absolute convergence kpk1 WD jP .x/j. P Observe that expected value Efxg D x P .x/ of x D f .!/ is a linear functional f .p/ D hf; pi on P.X /. Here, f is an element of P the dual space M0 .X / with respect to the pairing h; i, defined by the sum xy. Therefore, EfxsCt g D hf; psCt i is a linear constraint in problem (2). It is attractive to consider problems (1)–(3) as linear or convex optimization problems. In theory, this can be done if one defines time-valued distance between arbitrary points in P.X / as follows: n o t.p; q/ WD inf t 0 W p D Tt q ;

where minimization is over some family T of linear endomorphisms of P.X / (i.e. some family of left stochastic matrices T ). Then problem (1) can be expressed as maximization of linear functional hf; pi subject to constraint t.p; q/ . The computation of t.p; q/, however, is even more demanding than optimization problem (2) we would like to solve. On the other hand, there exist a number of information distances I.p; q/ on P.X /, which are easily computable. For example, the total variation and Fisher’s information metrics are defined as follows [8]: IV .p; q/ WD

X

jP .x/ Q.x/j ;

IF .p; q/ WD 2 arccos

x2f .˝/

X p P .x/Q.x/: x2f .˝/

Another important example is the Kullback–Leibler divergence [13]: X P .x/ P .x/: IKL .p; q/ WD ln Q.x/

(6)

x2f .˝/

It has a number of important properties, such as additivity IKL .p1 p2 ; q1 q2 / D IKL .p1 ; q1 / C IKL .p2 ; q2 /, and optimal evolution in IKL is represented by an evolution operator [5]. Thus, given an information distance I W P P ! RC [f1g, we can define the following optimization problem: ./ WD supfEp fxg W I.p; q/ g:

(7)

p

Here, represents an information constraint. Problem (7) has dual representation by the inverse function

1

./ WD inffI.p; q/ W Ep fxg g: p

(8)

These problems, unlike (1) and (2), have exact analytical solutions, if I.p; q/ is a closed (lower semicontinuous) function of p with finite values on some neighbourhood in P.X /. For example, the necessary and sufficient optimality

Dynamics of Information and Optimal Control of Mutation

9

conditions in problem (7) are expressed using the Legendre–Fenchel transform I .f; q/ WD supp Œhf; pi I.p; q/ of I.; q/, and can be obtained using the standard method of Lagrange multipliers (see [4] for derivation). In particular, if I .; q/ is Gˆateaux differentiable, then p.ˇ/ is an optimal solution if and only if: p.ˇ/ D rI .ˇf; q/ ;

I.p.ˇ/; q/ D ;

ˇ 1 D d./=d ;

ˇ 1 > 0:

(9)

Here, rI .; q/ denotes gradient of convex function I .; q/. For example, the dual functional of IKL .p; q/ is X IKL .f; q/ WD ln ex Q.x/: (10) x2f .˝/

Substituting its gradient into conditions (9), one obtains optimal solutions to problems (7) or (8) as a one-parameter exponential family: p.ˇ/ D eˇf f .ˇ/ p.0/ ;

p.0/ D q;

(11)

.ˇf; q/ is the cumulant generating function. Its first where f .ˇ/ WD ln IKL 0 derivative x .ˇ/, in particular, is the expected value Ep.ˇ/ fxg D hf; p.ˇ/i. Equation (11) corresponds to the following differential equation:

p 0 .ˇ/ D Œf hf; p.ˇ/i p.ˇ/:

(12)

This is the replicator equation, studied in population dynamics [15]. Note that fitness function f .!/, defining the replication rate, may depend on p in a general case. One can see that optimal evolution in information divergence IKL corresponds to replicator dynamics with respect to parameter ˇ—the inverse of a Lagrange multiplier related to the information constraint as ˇ 1 D d./=d. This property is unique to information divergence IKL [5], and we shall focus in this paper on optimal evolution (11).

3 Evolution of Sequences The main object of study in this work is a discrete system ˝ of sequences representing biological or artificial organisms. Such systems, although finite, can be too large to enumerate on a digital computer, and there are an infinite number of possible evolutions of finite populations of the organisms. It is possible to factorize the system by considering the evolution only on the equivalence classes, defined by an objective function, which is what we have described in previous section. The difficulty, however, is understanding the relation between the controls, which act on and transform elements of ˝, and the factorized system ˝=. In this section, we make general considerations of this issue, and then derive specific equations for the case, when ˝ is a Hamming space of sequences.

10

R.V. Belavkin

3.1 Topological Considerations and Controls We have defined the problem of optimal control of evolution of events in ˝ as a Markov decision process, where P .xsC1 j xs / is the transition probability between different values x D f .!/ of the objective function and depending on the control parameter . The specific expression for P .xsC1 j xs / depends on the structure of the domain ˝ of the objective function and the range of possible controls . If the control is a kind of a search operator in ˝, then a structure on ˝ can facilitate the search process. Recall that ˝ is a totally pre-ordered set: a . b if and only if f .a/ f .b/. The structure on ˝ must be reach enough to embed this pre-order. For example, if is a topology on ˝, then it is desirable that the principal downsets # a WD f! . ag are closed in , while their complements ˝n # a are open. Indeed, a sequence !0 ; : : : ; !s ; : : : such that !sC1 2 ˝n # !s corresponds to a sequence of strictly increasing values xi D f .!i /. If there exists an optimal (top) element > 2 ˝ such that sup f .!/ D f .>/, then such a sequence converges to x D f .>/. Note that finite set ˝ always contains > and ? elements. Let us define the following property of the objective function f .!/, which will also clarify the terms “smooth” and “rugged” fitness landscape, used in biological literature. Let us equip ˝ with a metric d W ˝ ˝ ! Œ0; 1/, so that similarity between a and b 2 ˝ can be measured by d.a; b/. We define f to be locally monotonic relative to d . Definition 1 (Monotonic landscape). Let .˝; d / be a metric space, and let f W ˝ ! R be a function with f .>/ D sup f .!/ for some > 2 ˝. We say that f is locally monotonic (locally isomorphic) relative to metric d if for each > there exists a ball B.>; r/ WD f! W d.>; !/ rg ¤ f>g such that for all a; b 2 B.>; r/: d.>; a/ d.>; b/

H) . ” /

f .a/ f .b/:

We say that f is monotonic (isomorphic) relative to d if B.>; r/ ˝. Example 1 (Negative distance). If f is isomorphic to d , then one can replace f .!/ by the negative distance d.>; !/. The number of values of such f is equal to the number of spheres S.>; r/ WD f! W d.>; !/ D rg. One can easily show also that when f is isomorphic to d , then there is only one > element: f .>1 / D f .>2 / ” d.>2 ; >1 / D d.>2 ; >2 / D 0 ” >1 D >2 . Example 2 (Needle in a haystack). Let f .!/ be defined as f .!/ D

1 if d.>; !/ D 0; 0 otherwise:

This function is often used in studies of performance of genetic algorithms (GAs). In biological literature, > element is often referred to as the wild type, and a twovalued landscape is used to derive error threshold and critical mutation rate [15].

Dynamics of Information and Optimal Control of Mutation

11

One can check that if for each > 2 ˝ there exists B.>; r/ ¤ f>g containing only one >, then two-valued f is locally monotonic relative to any metric. Indeed, conditions of the definition above are satisfied in all such B.>; r/ ˝. If ˝ has unique >, then the conditions are satisfied for B.>; 1/ D ˝. Optimal function .x/ for such f .!/ is related to maximization of probability P .xsC1 D 1 j xs /. For monotonic f , spheres S.>; l/ cannot contain elements with different values x D f .!/. We can generalize this property to weak or -monotonicity, which requires that the variance of x D f .!/ within elements of each sphere S.>; l/ is small or does not exceed some 0. These assumptions allow us to replace f .!/ by negative distance d.>; !/ and derive expressions for transition probability P .xsC1 j xs / using topological properties of .˝; d /. Monotonicity of f depends on the choice of metric, and one can define different metrics on ˝. Generally, one prefers metric d2 to d1 if the neighbourhoods, where f is monotonic relative to d2 , are “larger” than for metric d1 : B1 .>; r/ B2 .>; r/ for all Bi .>; r/, where f is monotonic relative to di . In this respect, the least preferable is the discrete metric: d.a; b/ D 0 if a D b; 0 otherwise. We shall now consider the example of ˝ being the Hamming space, which plays an important role in theoretical biology as well as engineering problems.

3.2 Mutation and Adaptation in a Hamming Space Biological organisms are represented by DNA sequences, and reproduction involves mutation and recombination of the parent sequences. Generally, a set of sequences ˝ can be equipped with different metrics and topologies. Here, we shall consider the case when ˝ is a Hamming space H˛l WD f1; : : : ; ˛gl —a space of sequences of length l and ˛ letters and equipped with the Hamming metric d.a; b/ WD jfi W ai ¤ bi gj. We shall also consider only asexual reproduction by simple mutation, which is defined as a process of independently changing each letter in a parent sequence to any of the other ˛ 1 letters with probability =.˛ 1/. This point mutation is defined by one parameter , called the mutation rate. Assuming that fitness function f .!/ is isomorphic to the negative Hamming distance d.>; !/, we shall derive probability P .xsC1 j xs / and optimize evolution of sequences by controlling the mutation rate. This complex problem has relevance not only for engineering problems but also for biology, because the abundance of neutral mutations in nature supports an intuition that biological fitness landscapes are at least weakly locally monotonic relative to the Hamming metric. We analyse asexual reproduction by mutation in metric space H˛l using geometric considerations, which are inspired by Fisher’s geometric model of adaptation in Euclidean space [10]. Let individual a be a parent of b, and let d.a; b/ D r. We consider asexual reproduction as a transition from parent a to a random point b on a sphere S.a; r/: b 2 S.a; r/ WD f! W d.a; !/ D rg

12

R.V. Belavkin

We refer to r as a radius of mutation. Suppose that d.>; a/ D n and d.>; b/ D m. We define the following probabilities: P .r j n/ WD P .b 2 S.a; r/ j a 2 S.>; n//; P .m j r; n/ WD P .b 2 S.>; m/ j b 2 S.a; r/; a 2 S.>; n//; P .r \ m j n/ WD P .b 2 S.a; r/ \ S.>; m/ j a 2 S.>; n//; P .m j n/ WD P .b 2 S.>; m/ j a 2 S.>; n//: These probabilities are related as follows: P .m j n/ D

l X

P .r \ m j n/ D

rD0

l X

P .m j r; n/P .r j n/:

(13)

rD0

For simple mutation of sequences in H˛l , the probability that b 2 S.a; r/ is defined by binomial distribution with probability 2 Œ0; 1 of mutation depending on n D d.>; a/: ! l P .r j n/ D .n/r .1 .n//lr : (14) r Probability P .m j r; n/ is defined by the number of elements in the spheres S.a; r/, S.>; m/ and their intersection as follows: P .m j r; n/ D

jS.>; m/ \ S.a; r/jd.>;a/Dn : jS.a; r/j

(15)

The number of sequences in the intersection S.a; r/ \ S.>; m/ with condition d.>; a/ D n is computed by the following formula: jS.>; m/ \ S.a; r/jd.>;a/Dn

! ! ! X n r0 n r rC l n D .˛ 2/ .˛ 1/ ; rC r r0 (16)

where triple summation runs over r0 , rC and r satisfying conditions rC 2 Œ0; .r C m n/=2, r 2 Œ0; .n jr mj/=2, r rC D n maxfr; mg and r0 C rC C r D minfr; mg. These conditions can be obtained from metric inequalities for r, m and n (e.g. jn mj r n C m). The number of sequences in S.a; r/ H˛l is ! r l : (17) jS.a; r/j D .˛ 1/ r Equations (14)–(17) can be substituted into (13) to obtain the precise expression for transition probability P .m j n/ in Hamming space H˛l .

Dynamics of Information and Optimal Control of Mutation

13

4 Solutions for Special Cases and Simulation Results In this section, we derive optimal control functions .n/ for several special cases and then evaluate their performance. Given a mutation rate control function .n/, we can compute operator T.n/ using (13) for transition probabilities P .m j n/ in a Hamming space H˛l . Table 1 lists the expected times of convergence of the resulting processes to the optimal state x D sup f .!/, computed by (5) using corresponding absorbing Markov chain. As a reference, Table 1 reports also the expected time for a process with a constant mutation rate D 1= l, which corresponds to the error threshold [9, 15] and is sometimes considered optimal (e.g. [16]). Then we t use powers T.n/ of the Markov operators to simulate the processes on a digital computer. The examples of resulting evolutions in time for H210 are shown in Fig. 4, and Fig. 5 shows the corresponding evolutions in information.

4.1 Optimal Mutation Rate for Next Generation Let us consider mutation rate maximizing expected fitness of the next generation. This corresponds to problem (1) with D 1, and it corresponds to minimization of the following conditional expectation: E fm j ng D

l X

m P .m j n/:

mD0

Figure 1 shows level sets of E fm j ng as a function of n D d.>; a/ in H230 and different mutation rates . One can show that mutation rate optimizing the next generation is the following step function: 8 < 0 if n < l.1 1=˛/; .n/ WD 12 if n D l.1 1=˛/; : 1 otherwise:

Table 1 Expected times Eft g of convergence to optimum in Hamming spaces Hl˛ using Markov processes for different controls .n/ of mutation rate .n/ H10 H10 H30 2 4 2 2 4 Constant 1= l 16; 6 10 163; 3 10 170; 4 107 Step 1 1 1 Linear n= l 2; 5 102 14; 9 104 7; 6 107 max P .m < n j n/ 3; 8 102 19; 9 104 17; 8 107 P0 .m < n/ 13; 9 102 570; 6 104 256; 8 107

14

R.V. Belavkin 1

Mutation rate m

0.75

0.5

0.25

0

0

5

10

15

20

25

30

Distance to optimum n = d(T, a) Fig. 1 Expected value E fm j ng of distance m D d.>; b/ to optimum > 2 H30 2 after one transformation a 7! b as a function of n D d.>; a/ and mutation rate . Dashed curves show level sets of E fm j ng; solid curve shows the minimum

Clearly, the corresponding operator T.n/ is not optimal for t > 1 generations, because it does not change the distribution of sequences in H˛l , if d.>; !/ < l .1 1=˛/ for all !. In the space H2l of binary sequences, this occurs after just one generation. Thus, Fig. 4 shows no change in the expected fitness after t > 1 for this control function. Figure 5 also shows quite a significant information divergence, so that the optimal information value is not achieved. Note also that for sequences of length l > 1, this strategy has infinite expected time to converge to state m D 0 (or xsCt D sup f .!/) (see Table 1).

4.2 Maximizing Probability of Optimum Minimization of the convergence time to state m D 0 is related to maximization of probability P .m D 0 j n/, which has the following expression: P .m D 0 j n/ D .˛ 1/n n .1 /ln :

(18)

Mutation rate maximizing this probability is given by taking its derivative to zero: d P .m D 0 j n/ D .˛ 1/n n1 .1 /ln1 .n l/ D 0: d

Dynamics of Information and Optimal Control of Mutation

15

Together with d2 P =d2 0, this gives condition n l D 0 or .n/ D

n : l

(19)

This linear mutation control function has very intuitive interpretation: if sequence a has n letters different from the optimal sequence >, then substitute n letters in the offspring. One can show that the linear function (19) is optimal for two-valued fitness landscapes with one optimal sequence, such as the Needle in a Haystack discussed in Example 2. This is because expected fitness E.x/ fxsCt g in this case is completely defined by probability (18). For other fitness landscapes that are monotonic relative to the Hamming metric, function (19) can be a good approximation of optimal control in terms of (1) with large time constraint or (2) with constraint D sup f .!/. Table 1 shows good convergence times Eftg to the optimum. However, Fig. 4 shows that evolution in time is extremely slow in the initial stage, and in fact not optimal for t < Eftg. Figure 5 shows also that performance in terms of information value for this strategy is very poor.

4.3 Maximizing Probability of Success Consider the following probability: P .m < n j n/ D

n1 X

P .m j n/:

mD0

B¨ack referred to it as probability of success and derived mutation rate .n/ maximizing it for the space H2l of binary sequences [2]. Figure 2 shows this curve for H210 , and similar curves can be obtained for the general case H˛l using equations from previous section (Fig. 3). Although this strategy allows one to achieve good performance, as can be seen from Figs. 4 and 5, it does not solve optimization problems (1) or (3) in general. To see this, observe that maximization of P .m < n P j n/ is equivalent to maximization of conditional expectation E fu.m; n/ j ng D m u.m; n/P .m j n/ of a two-valued utility function u.m; n/ D

1 if m < n; 0 otherwise:

First, this function has only two values, and they depend on two arguments m D d.>; b/ and n D d.>; a/. Thus, u does not correspond to fitness functions with

16

R.V. Belavkin 1

Mutation rate m

0.75

0.5

0.25

0

0

5

10

15

20

Distance to optimum n = d(T,a)

25

30

Fig. 2 Probability of “success” P .m < n j n/ that b is closer to > 2 H30 2 than a after one transformation a 7! b as a function of n D d.>; a/ and mutation rate . Dashed curves show level sets of P .m < n j n/; solid curve shows the maximum 1

Mutation rate m

0.75

0.5

0.25

0

0

5

10

15

20

25

30

Distance to optimum n = d(T,a) Fig. 3 Probability P0 .m < n/, computed as cumulative distribution function of P0 .m/ in H30 2 , defined by (23)

more than two values, such as the negative distance in Example 1. Note also that fitness usually depends on just one argument (i.e. on the genotype of one individual). Second, the optimization is done for one transition (i.e. next generation), while we

Dynamics of Information and Optimal Control of Mutation

17

Distance to optimum n = d (T, a)

0

1 Constant 1/l Step Linear n/l maxm Pm(m < n | n) P0(m 2 H10 2 as a function of generation t (time). Different curves correspond to different controls .n/ of mutation rate

Distance to optimum n = d( T, a)

0

1

2

Const 1/l Step Linear n/l maxm Pm(m < n | n) P0(m 2 H10 2 as a function of information divergence from initial distribution. Different curves correspond to different controls .n/ of mutation rate; ./ represents theoretical optimum

are interested in a mutation rate control maximizing expected fitness after t > 1 generations. In fact, one can see from Table 1 that linear control (19) of the mutation rate gives shorter expected times of convergence into absorbing state m D 0.

18

R.V. Belavkin

4.4 Minimum Information Rate Let us consider the problem of controlling a mutation rate to maximize the evolution in information, as defined by the optimal value function ./ in (7) or its inverse (8). As stated earlier, the optimal transition kernels for these problems belong to an exponential family (11), and for the transitions in a Hamming space with f .!/ D d.>; !/, and using notation n D d.>; a/, m D d.>; b/, the transition kernel has the form Pˇ .m j n/ D eˇ.nm/.nm/ .ˇ/ P .m/:

(20)

The difference n m represents fitness value of m relative to n; expf.nm/ .ˇ/g is the normalizing factor, which depends on ˇ and n. Given an initial distribution P .n/, one can obtain its transformation P .m/ D Tˇ P .n/, where operator Tˇ is defined by transition probabilities above. Thus, the optimal value function ./ can be computed using ˇ 2 R as parameter—its argument is the information divergence IKL .P .m/; P .n//, and its values are the expected fitness Efmg D P m P .m/. An example of function ./ for H210 is shown in Fig. 5. Our task is to define a mutation control function .n/ such that the evolution defined by the corresponding Markov operator T.n/ achieves optimal values ./. Recall that given random variable .˝; F ; P /, the value h.!/ D ln P .!/ is called random entropy of outcome !. In fact, it can be computed as information divergence IKL .ı! ; P .!// D lnPP .!/ of the Dirac measure ı! . Entropy is the expected value Efh.!/g D Œln P .!/ P .!/. We can also define random information .!; / of two variables as h.!/ h.! j / D lnŒP .! j /=P .!/, and its expected value with respect to joint distribution P .!; / is Shannon’s mutual information [17]. Conditional probability can be expressed using .!; /: P .! j / D e .!;/ P .!/: Comparing this to (20), one can see that the quantity ˇ.n m/ .nm/ .ˇ/ plays a role of random information .m; n/. In fact, one can show that the Legendre–Fenchel 1 dual of f .ˇ/ is the inverse optimal value function ./ D supfˇ f .ˇ/g, and it is defined by (8) as the minimal information subject to Efxg . To see how mutation rate .n/ can be related to information, let us write transition probability (13) for a Hamming space in the exponential form: P .m j n/ D

l X rD0

er ln .n/C.lr/ lnŒ1.n/

jS.a; r/ \ S.>; m/jn : .˛ 1/r

(21)

Our experiments show that optimal values ./ are achieved if random entropy h.n/ D ln .n/ is identified with h.m < n j n/ D ln P0 .m < n/, where

Dynamics of Information and Optimal Control of Mutation

19

P0 .m < n/, shown on Fig. 3, is computed as the cumulative distribution function of the “least informed” distribution P0 .m/: .n/ D P0 .m < n/ D

n1 X

P0 .m/:

(22)

mD0

Here, the distribution P0 .m/ WD P0 .! 2 S.>; m// is obtained assuming a uniform distribution P0 .!/ D ˛ l of sequences in H˛l . Thus, P0 .m/ can be obtained by counting sequences in the spheres S.>; n/ H˛l , and it corresponds to binomial distribution with D 1 1=˛: ! ! l l .˛ 1/m m lm P0 .m/ D D : .1 / ˛l m m

(23)

In this case, Efmg D l D l.1 1=˛/. Control of mutation rate by function (22) has the following interpretation: if sequence a has n letters different from the optimal sequence >, then substitute each letter in the offspring with a probability that d.>; b/ D m < n. We refer to such control as minimum information, because it achieves the same effect as using 1 exponential probability (20) for minimal information .m; n/ D ./. Figure 5 shows that this strategy achieves almost perfectly theoretical optimal information value ./. Perhaps, even more interesting is that this strategy is optimal in the initial stages of evolution in time, as seen in Fig. 4. Table 1 shows that convergence to the optimal state is very slow. However, Fig. 4 shows that the expected fitness is higher than for any other strategy even after generation t D 250, which is the smallest expected convergence time in Table 1. Similar results were observed in other Hamming spaces. Interestingly, the performance of the minimal information strategy in terms of cumulative objective function (3) is also better than other strategies during significant part of the evolution.

5 Discussion We have considered differences between problems of optimization of evolution in time and optimization of evolution in information. These problems have been studied in relation to optimization of mutation rate in evolutionary algorithms and biological applications. Traditional approach to such problems is based on sequential optimization using methods of dynamic programming and approximate numerical solutions. However, in many practical applications the complexity overwhelms even the most powerful computers. Even in the most simple biological systems, dimensionality of the corresponding spaces of sequences and time horizon make sequential optimization intractable.

20

R.V. Belavkin

On the other hand, optimization of evolution in information can be formulated as convex optimization, and analytical solutions are often available. These solutions define performance bounds against which various algorithms can be evaluated and optimal or nearly optimal solutions can be found. Our results suggest that optimization of evolution in information can also help solve sequential optimization problems. This may provide an alternative way to tackle optimization problems, for which traditional methods have not been effective. Acknowledgements This work was supported by UK EPSRC grant EP/H031936/1.

References 1. Amari, S.I.: Differential-Geometrical Methods of Statistics. In: Lecture Notes in Statistics, vol. 25. Springer, Berlin (1985) 2. B¨ack, T.: Optimal mutation rates in genetic search. In: Forrest, S. (ed.) Proceedings of the 5th International Conference on Genetic Algorithms, pp. 2–8. Morgan Kaufmann (1993) 3. Belavkin, R.V.: Bounds of optimal learning. In: 2009 IEEE International Symposium on Adaptive Dynamic Programming and Reinforcement Learning, pp. 199–204. IEEE, Nashville, TN, USA (2009) 4. Belavkin, R.V.: Information trajectory of optimal learning. In: Hirsch, M.J., Pardalos, P.M., Murphey, R. (eds.) Dynamics of Information Systems: Theory and Applications, Springer Optimization and Its Applications Series, vol. 40. Springer, Berlin (2010) 5. Belavkin, R.V.: On evolution of an information dynamic system and its generating operator. Optimization Letters (2011). DOI:10.1007/s11590-011-0325-z 6. Bellman, R.E.: Dynamic Programming. Princeton University Press, Princeton, NJ (1957) 7. Bernstein, D.S., Hyland, D.C.: The optimal projection/maximum entropy approach to designing low-order, robust controllers for flexible structures. In: Proceedings of 24th Conference on Decision and Control, pp. 745–752. Ft. Lauderdale, FL (1985) 8. Chentsov, N.N.: Statistical Decision Rules and Optimal Inference. Nauka, Moscow, U.S.S.R. (1972). In Russian, English translation: Providence, RI: AMS, 1982 9. Eigen, M., McCaskill, J., Schuster, P.: Molecular quasispecies. J. Phys. Chem. 92, 6881–6891 (1988) 10. Fisher, R.A.: The Genetical Theory of Natural Selection. Oxford University Press, Oxford (1930) 11. Kaelbling, L.P., Littman, M.L., Moore, A.W.: Reinforcement learning: A survey. J. Artif. Intell. Res. 4, 237–285 (1996) 12. Kalman, R.E., Bucy, R.S.: New results in linear filtering and prediction theory. Trans. ASME Basic Eng. 83, 94–107 (1961) 13. Kullback, S., Leibler, R.A.: On information and sufficiency. Ann. Math. Stat. 22(1), 79–86 (1951) 14. Nix, A.E., Vose, M.D.: Modeling genetic algorithms with Markov chains. Ann. Math. Artif. Intell. 5(1), 77–88 (1992) 15. Nowak, M.A.: Evolutionary Dynamics: Exploring the Equations of Life. Harvard University Press, Cambridge (2006) 16. Ochoa, G.: Setting the mutation rate: Scope and limitations of the 1= l heuristics. In: Proceedings of Genetic and Evolutionary Computation Conference (GECCO-2002), pp. 315–322. Morgan Kaufmann, San Francisco, CA (2002) 17. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 and 623–656 (1948)

Dynamics of Information and Optimal Control of Mutation

21

18. Stratonovich, R.L.: Optimum nonlinear systems which bring about a separation of a signal with constant parameters from noise. Radiofizika 2(6), 892–901 (1959) 19. Stratonovich, R.L.: On value of information. Izv. USSR Acad. Sci. Tech. Cybern. 5, 3–12 (1965) (In Russian) 20. Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. Adaptive Computation and Machine Learning. MIT Press, Cambridge, MA (1998) 21. Tsypkin, Y.Z.: Foundations of the Theory of Learning Systems. In: Mathematics in Science and Engineering. Academic, New York (1973) 22. Yanagiya, M.: A simple mutation-dependent genetic algorithm. In: Forrest, S. (ed.) Proceedings of the 5th International Conference on Genetic Algorithms, p. 659. Morgan Kaufmann (1993)

Integration Principle as the Master Equation of the Dynamics of an Information System Victor Korotkikh and Galina Korotkikh

Abstract In the paper we consider the hierarchical network of prime integer relations as a system of information systems. The hierarchical network is presented by the unity of its two equivalent forms, i.e., arithmetical and geometrical. In the geometrical form a prime integer relation becomes a two-dimensional pattern made of elementary geometrical patterns. Remarkably, a prime integer relation can be seen as an information system itself functioning by the unity of the forms. Namely, while through the causal links of a prime integer relation the information it contains is instantaneously processed and transmitted, the elementary geometrical patterns take the shape to simultaneously reproduce the prime integer relation geometrically. Since the effect of a prime integer relation as an information system is entirely given by the two-dimensional geometrical pattern, the information can be associated with its area. We also consider how the quantum of information of a prime integer relation can be represented by using space and time as dynamical variables. Significantly, the holistic nature of the hierarchical network makes it possible to formulate a single universal objective of a complex system expressed in terms of the integration principle. We suggest the integration principle as the master equation of the dynamics of an information system in the hierarchical network. Keywords Information system • Prime integer relation • Quantum of information • Complexity • Integration principle

V. Korotkikh () • G. Korotkikh School of Information and Communication Technology CQUniversity, Mackay, QLD 4740, Australia e-mail: [email protected]; [email protected] A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 2, © Springer Science+Business Media New York 2012

23

24

V. Korotkikh and G. Korotkikh

1 Introduction In the paper we consider the hierarchical network of prime integer relations as a system of information systems. For this purpose in Sect. 2 we present the hierarchical network by the unity of its two equivalent forms, i.e., arithmetical and geometrical. In particular, we discuss that in the geometrical form a prime integer relation becomes a two-dimensional pattern made of elementary geometrical patterns. Remarkably, a prime integer relation can be seen as an information system functioning by the unity of two forms. Namely, while through the causal links of a prime integer relation the information is instantaneously processed and transmitted for the prime integer relation to be defined, the elementary geometrical patterns take the shape to simultaneously reproduce the prime integer relation geometrically. Therefore, a prime integer relation has a very important property to process and transmit information to the parts so that they can operate together for the system to exist and function as a whole. Since the effect of a prime integer relation as an information system is entirely given by the two-dimensional geometrical pattern, the information can be associated with the geometrical pattern and its area in particular. This suggests that in a prime integer relation the information is made of quanta given by the elementary geometrical patterns and measured by their areas. In Sect. 3 we consider how the quantum of information of a prime integer relation can be represented by using space and time as dynamical variables. In Sect. 4 we discuss that the holistic nature of the hierarchical network makes it possible to formulate a single universal objective of a complex system expressed in terms of the integration principle. We suggest the integration principle as the master equation of the dynamics of an information system in the hierarchical network.

2 The Hierarchical Network of Prime Integer Relations as a System of Information Systems The hierarchical network has been defined within the description of complex systems in terms of self-organization processes of prime integer relations [1–7]. Remarkably, in the hierarchical network arithmetic and geometry are unified by two equivalent forms, i.e., arithmetical and geometrical. At the same time, the arithmetical and geometrical forms play the different roles. For example, while the arithmetical form sets the relationships between the parts of a system, the geometrical form makes it possible to measure the effect of the relationships on the parts. In the arithmetical form the hierarchical network comes into existence by the totality of the self-organization processes of prime integer relations. Starting with

Integration Principle as the Master Equation of the Dynamics: : :

25

the integers the processes build the hierarchical network under the control of arithmetic as one harmonious and interconnected whole, where not even a minor change can be made to any of its elements. In the description a complex system is defined by a number of global quantities conserved under self-organization processes. The processes build hierarchical structures of prime integer relations, which determine the system. Importantly, since a prime integer relation expresses a law between the integers, the complex system becomes governed by the laws of arithmetic realized by the self-organization processes of prime integer relations. Remarkably, a prime integer relation of any level can be considered as a complex system itself. Indeed, it is formed by a process from integers as the initial building blocks and then from prime integer relations of the levels below with the relationships set by arithmetic. Because each and every element in the formation is necessary and sufficient for the prime integer relation to exist, we call such an integer relation prime. In the geometrical form the formation of a prime integer relation can be isomorphically represented by the formation of two-dimensional geometrical patterns [1–3]. In particular, in the geometrical form a prime integer relation, as well as a corresponding law of arithmetic, becomes expressed by a two-dimensional geometrical pattern made of elementary geometrical patterns, i.e., the quanta of the prime integer relation. Notably, when the areas of the elementary geometrical patterns are calculated they turn out to be quantized [8–10]. Due to the isomorphism of the forms, the relationships in a prime integer relation determine the shape of the elementary patterns to make the whole geometrical pattern. Strictly controlled by arithmetic, the shapes of the elementary geometrical patterns cannot be changed even a bit without breaking the relationships and thus the prime integer relation. Significantly, a prime integer relation can be seen as an information system functioning through the unity of the forms. In particular, while through the causal links of a prime integer relation the information it contains is instantaneously processed and transmitted for the prime integer to become defined, the elementary geometrical patterns take the shape to simultaneously reproduce the prime integer relation geometrically. Since the effect of a prime integer relation as an information system is entirely given by the two-dimensional geometrical pattern, the information can be associated with the geometrical pattern and its area in particular. This suggests that in a prime integer relation the information is made of quanta given by the elementary geometrical patterns and measured by their areas [10]. As a result, a concept of information based on the self-organization processes of prime integer relations and thus arithmetic can be defined. Now let us illustrate the general results. It has been shown that if under the transition from one state s D s1 : : : sN to another state s 0 D s10 : : : sN0 at level 0 k 1 quantities of the complex system remain invariant, then k Diophantine equations

26

V. Korotkikh and G. Korotkikh

.m C N /k1 s1 C .m C N 1/k1 s2 C C .m C 1/k1 sN D 0; :

:

:

:

:

.m C N / s1 C .m C N 1/ s2 C C .m C 1/1 sN D 0; 1

1

.m C N /0 s1 C .m C N 1/0 s2 C C .m C 1/0 sN D 0

(1)

and an inequality .m C N /k s1 C .m C N 1/k s2 C : : : C .m C 1/k sN ¤ 0

(2)

take place [1–3]. In particular, it is assumed that in the state s D s1 : : : sN there are jsi j of integers mCN i C1; i D 1; : : : ; N “charged” positively, if si > 0, or “charged” negatively, if si < 0. Similarly, in the state s 0 D s10 : : : sN0 there are jsi0 j of integers m C N i C 1; i D 1; : : : ; N “charged” positively, if si0 > 0, or “charged” negatively, if si0 < 0. At the same time m and N; N 2 are integers and si D si0 si ; i D 1; : : : ; N; where si ; si0 2 I and I is a set of integers. Notably, integers m C N; m C N 1; : : : ; m C 1 appear as the initial building blocks of the system and to make the transition from the state s D s1 : : : sN to the state s 0 D s10 : : : sN0 it is required that jsi j of integers m C N i C 1; i D 1; : : : ; N have to be generated from the “vacuum” positively “charged,” if si > 0, or “charged” negatively, if si < 0. Let us consider the Diophantine equations (1) when the PTM (Prouhet-ThueMorse) sequence of length N D C1 1 1 C 1 1 C 1 C 1 1 : : : D 1 : : : N specifies a solution si D i ; i D 1; : : : ; N for N D 2k ; k D 1; 2; : : : : Namely, in this case the Diophantine equations (1) and inequality (2) become N k1 1 C .N 1/k1 2 C C 1k1 N D 0; :

:

:

:

N 1 1 C .N 1/1 2 C C 11 N D 0; N 0 1 C .N 1/0 2 C C 10 N D 0

(3)

Integration Principle as the Master Equation of the Dynamics: : :

27

and N k 1 C .N 1/k 2 C C 1k N ¤ 0;

(4)

where m D 0. For example, when N D 16 we can explicitly write (3) and (4) as C163 153 143 C 133 123 C 113 C 103 93 83 C 73 C 63 53 C 43 33 23 C 13 D 0 C162 152 142 C 132 122 C 112 C 102 92 82 C 72 C 62 52 C 42 32 22 C 12 D 0 C161 151 141 C 131 121 C 111 C 101 91 81 C 71 C 61 51 C 41 31 21 C 11 D 0 C160 150 140 C 130 120 C 110 C 100 90 80 C 70 C 60 50 C 40 30 20 C 10 D 0

(5)

and C 164 154 144 C 134 124 C 114 C 104 94 84 C 74 C 64 54 C 44 34 24 C 14 ¤ 0:

(6)

Next we consider one of the self-organization processes of prime integer relations that can be associated with the system of integer relations (5) and inequality (6). The self-organization process starts as integers 16; : : : ; 1 are generated from the “vacuum” to appear at level 0 positively or negatively “charged” depending on the sign of the corresponding element in the PTM sequence. Then the integers combine into pairs and make up the prime integer relations of level 1. Following a single organizing principle [1–3] the process continues as long as arithmetic allows the prime integer relations of a level to form the prime integer relations of the higher level (Fig. 1). In the geometrical form, which is specified by two parameters " 1 and ı 1, the self-organization process become isomorphically represented by transformations of two-dimensional patterns (Fig. 2). Remarkably, under the isomorphism a prime integer relation turns into a corresponding geometrical pattern, which can be viewed as the prime integer relation itself, but only expressed geometrically. At level 0 the geometrical pattern of integer 16 i C 1; i D 1; : : : ; 16 is given by the region enclosed by the boundary curve, i.e., the graph of the function Œ0

1 .t/ D i ı; ti 1 t < ti ; the vertical lines t D ti 1 ; t D ti and the t-axis, where tj D j"; j D 0; : : : ; 16.

28

V. Korotkikh and G. Korotkikh

Fig. 1 The hierarchical structure of prime integer relations built by the process

At level l D 1; 2; 3; 4 the geometrical pattern of the i th i D 1; : : : ; 24l prime integer relation is defined by the region enclosed by the boundary curve, i.e., the graph of the function Œl

1 .t/; t2l .i 1/ t t2l i ; and the t-axis. As the integers of level l D 0 or the prime integer relations of level l D 1; 2; 3 form the prime integer relations of level l C 1, under the integration of the function Œl

1 .t/; t0 t t16 subject to ŒlC1

1

.t0 / D 0;

the geometrical patterns of level l transform into the geometrical patterns of level l C 1. Remarkably, the geometrical pattern of a prime integer relation is composed of elementary geometrical patterns, i.e., the quanta of the prime integer relation. For example, the i th i D 1; : : : ; 8 elementary geometrical pattern of the prime integer relation C162 152 142 C 132 122 C 112 C 102 92 D 0

Integration Principle as the Master Equation of the Dynamics: : :

29

Fig. 2 The hierarchical structure of geometrical patterns

is the region enclosed by the boundary curve, i.e., the graph of the function Œ3

1 .t/; ti 1 t ti ; the vertical lines t D ti 1 ; t D ti and the t-axis. Significantly, the areas of the elementary geometrical patterns of a prime integer relation turn out to be quantized. For instance, the areas of the elementary geometrical patterns G14 ; : : : ; G16;4 of the prime integer relation C163 153 143 C 133 123 C 113 C 103 93 83 C 73 C 63 53 C 43 33 23 C 13 D 0

30

V. Korotkikh and G. Korotkikh

produce a discrete spectrum of quantized values A.G14 /; : : : ; A.G16;4 / D

1 29 149 361 599 811 931 959 ; ; ; ; ; ; ; ; 120 120 120 120 120 120 120 120 959 931 811 599 361 149 29 1 ; ; ; ; ; ; ; ; 120 120 120 120 120 120 120 120

when " D 1 and ı D 1 [9, 10]. Notably, the area A.Gi 4 / of an elementary geometrical pattern Gi 4 ; i D1; : : : ; 16 can be given by the equation A.Gi 4 / D h.Gi 4 /; where hD

1 120

and .Gi 4 / is a corresponding number. When the prime integer relation becomes defined, the amount of information I.Gi 4 / processed and transmitted to the i th elementary geometrical pattern Gi 4 ; i D 1; : : : ; 16 is given by the area of the geometrical pattern I.Gi 4 / D A.Gi 4 /: Now, let us illustrate the processing and transmission of information by using a prime integer relation 21 s1 C 11 s2 C 01 s3 D 0

(7)

of level 2, where s1 D C1; s2 D 2, and s3 D C1. The prime integer relation (7) is formed from a prime integer relation 20 s1 C 10 s2 C 00 s3 D 0

(8)

of level 1. The integer relation (8) is prime by definition, because all integers, i.e., one positively “charged” integer 2, two negatively “charged” integers 1, as one indivisible block, and one positively “charged” integer 0, are necessary and sufficient for the formation of the prime integer relation. Next we consider an integer relation 21 s1 C 11 s2 D 0;

(9)

where, in comparison with (7), the term 01 s3 is hidden. We can rewrite (9) as 21 s1 D 11 s2 :

(10)

Although the integer relation (9) simplifies things, yet in our illustration it gives an interesting interpretation of the equals sign.

Integration Principle as the Master Equation of the Dynamics: : :

31

In particular, as soon as the integer relation (9) becomes operational by setting s2 D 2, we can see from (10) that the information is instantaneously processed and through the equals sign, working and looking like a channel, transmitted for s1 to be set s1 D 1, so that the parts can simultaneously give rise to the integer relation 21 1 C 11 .2/ D 0 emerging as one whole. Therefore, a prime integer relation, as an information system, has a very important property. Namely, a prime integer relation has the power to process and transmit information to the parts, so that they can operate together for the system to exist and function as a whole. Remarkably, this property of the prime integer relation can be expressed in terms of space and time as dynamical variables [8–10]. A quantum of a prime integer relation, as a quantum of information, is given by an elementary geometrical pattern fully defined by the boundary curve and the area. Therefore, the representation of the quantum of information can be done by the representation of the boundary curve and the area of the geometrical pattern. For this purpose an elementary part could come into existence. In particular, once the boundary curve is specified by the space and time variables of the elementary part and the area associated with its energy, the quantum of information becomes represented by the elementary part. As a result, the law of motion of the elementary part is determined by the law of arithmetic the prime integer relation realizes. Significantly, the area of the geometrical pattern of a prime integer relation can be conserved under a renormalization. Therefore, the energy becomes an important variable of the representation [8–10]. For example, in Fig. 2 the renormalization is illustrated by a function Œ1

2 .t/; t0 t t16 : Notably, the area of the geometrical pattern of the prime integer relation C163 153 143 C 133 123 C 113 C 103 93 83 C 73 C 63 53 C 43 33 23 C 13 D 0 remains the same under the renormalization Zt16 t0

Œ4 1 .t/dt

Zt16 D

Œ1

2 .t/dt t0

and thus the energy of the elementary parts representing the prime integer relation by their space and time variables is conserved.

32

V. Korotkikh and G. Korotkikh

3 Representation of the Quantum of Information by Space and Time as Dynamic Variables Now let us consider how the quantum of information of a prime integer relation can be represented by using space and time as dynamical variables [8–10]. Figure 1 shows that in the arithmetical form there are no relationships between the integers at level 0. On the other side, in the geometrical form (Fig. 2) the boundary curve of the geometrical pattern of integer 16 i C 1; i D 1; : : : ; 16 is given by the piecewise constant function Œ0

1 .t/; ti 1 t < ti and can be represented by the space Xi 0 and Ti 0 time variables of an elementary part Pi 0 . Namely, as the elementary part Pi 0 makes transition from one state into another at the moment Ti 0 .ti 1 / D 0 of its local time the space variable Xi 0 .ti 1 / of the elementary part Pi 0 changes by Œ0

Xi 0 D 1 .ti 1 / D i ı and then stays as it is, while the time variable Ti 0 .t/; ti 1 t < ti ; changes independently as the length of the boundary curve v Zt u u t1 C Ti 0 .t/ D Ti 0 .t/ Ti 0 .ti 1 / D Ti 0 .t/ D

Œ0

d1 .t 0 / dt 0

!2 dt 0 ;

ti 1

where

v Zt u u t1 C Ti 0 D lim t !ti

Œ0

d1 .t 0 / dt 0

!2 dt 0 D ":

ti 1

Under the integration of the function Œl

1 .t/; l D 0; 1; 2; 3; t0 t t16 ; subject to ŒlC1

1

.t0 / D 0;

the geometrical patterns of the integers of level l D 0 and the prime integer relations of level l D 1; 2; 3 transform into the geometrical patterns of the prime integer

Integration Principle as the Master Equation of the Dynamics: : :

33

relations of level l C1. As a result, the boundary curve of an elementary geometrical pattern Gi l ; i D 1; : : : ; 16, i.e., the graph of the function Œl

1 .t/; ti 1 t ti ; transforms into the boundary curve of an elementary geometrical pattern Gi;lC1 , i.e., the graph of the function ŒlC1

1

.t/; ti 1 t ti :

Defined at levels 1; 2; 3; 4 elementary parts represent the boundary curves of the geometrical patterns by their space and time variables [8–10]. In particular, at level 1 the space variable Xi1 .t/ and the time variable Ti1 .t/; ti 1 t ti of an elementary part Pi1 ; i D 1; : : : ; 16 become linearly dependent and characterize the motion of the elementary part Pi1 by Ti1 .t/ sin ˛i D Xi1 .t/;

(11)

where Œ1

Œ1

Xi1 .t/ D Xi1 .t/ Xi1 .ti 1 / D 1 .t/ 1 .ti 1 /; v s !2 Zt u Zt Œ1 u d1 .t 0 / dXi1 .t 0 / 2 0 t 0 Ti1 .t/ D 1C dt D 1C dt dt 0 dt 0 ti 1

ti 1

and the angle ˛i is given by Œ0

tan ˛i D 1 .ti 1 /: Let Xi1 D Xi1 .ti / Xi1 .ti 1 / and, since Ti1 .ti 1 / D 0, Ti1 D Ti1 .ti / Ti1 .ti 1 / D Ti1 .ti /: The velocity Vi1 .t/; ti 1 t ti of the elementary part Pi1 , as a dimensionless quantity, can be defined by Xi1 .t/ : (12) Vi1 .t/ D Ti1 .t/ Using (11) and (12), we obtain Vi1 .t/ D sin ˛i

34

V. Korotkikh and G. Korotkikh

and, since the angle ˛i is constant, the velocity Vi1 .t/ must also stay constant Vi1 .t/ D Vi1 : By definition 1 sin ˛i 1, so we have 1 Vi1 1:

(13)

Since the velocity Vi1 is a dimensionless quantity, the condition (13) determines a velocity limit c [9, 10]. Therefore, the dimensional velocity vi1 of the elementary part Pi1 can be given by vi1 (14) Vi1 D sin ˛i D c and thus jvi1 j c. Now let us consider how the times Ti 0 and Ti1 of the elementary parts Pi 0 and Pi1 ; i D 1; : : : ; 16 are connected. From Fig. 2 we can find that Ti1 j cos ˛i j D Ti 0 and, by using (14), we get Ti 0 Ti1 D q : v2i1 1 c2

(15)

Since the motions of the elementary parts Pi 0 and Pi1 have to be realized simultaneously, then, according to (15), the time Ti1 .t/ of the elementary part Pi1 runs faster than the time Ti 0 .t/; ti 1 t ti of the elementary part Pi 0 . Remarkably, (15) symbolically reproduces the well-known formula connecting the elapsed times in the moving and the stationary systems [11] and allows its interpretation. In particular, as long as one tick of the clock of the moving elementary part Pi1 takes longer Ti1 > Ti 0 than one tick of the clock of the stationary elementary part Pi 0 , then the time in the moving system will be less than the time in the stationary system. Notably, at level 1 the motion of the elementary part Pi1 has the invariant Ti12 Xi12 D "2 ;

(16)

where features of the Lorentz invariant can be recognized. Significantly, in the representation of the boundary curve the space and time variables of an elementary part Pi l ; i D 1; : : : ; 16 at level l D 2; 3; 4 become interdependent. As a result, the boundary curve can be seen as their joint entity defining the local spacetime of the elementary part Pi l . For the sake of consistency, we consider that the boundary curves at level l D 0; 1 also define the local spacetimes of the elementary parts.

Integration Principle as the Master Equation of the Dynamics: : :

35

In particular, in the representation of the boundary curve given by the graph of the function Œl

1 .t/; ti 1 t ti ; i D 1; : : : ; 16; l D 2; 3; 4 the space variable Xi l .t/ of the elementary part Pi l is defined by Œl

Xi l .t/ D 1 .t/; ti 1 t ti :

(17)

In its turn the time variable Ti l .t/ of the elementary part Pi l is defined by the length of the curve v Zt u u t1 C Ti l .t/ D ti 1

Zt D

s

Œl

d1 .t 0 / dt 0

1C

dXi l .t 0 / dt 0

!2 dt 0

2

dt 0 ; ti 1 t ti :

(18)

ti 1 Œl

As a result of (18) and the character of the function 1 .t/, the space Xi l .t/ and time Ti l .t/ variables become interdependent [8–10]. Moreover, the motion of the elementary part Pi l can be defined by the change of the space variable Xi l .t/ with respect to the time variable Ti l .t/. Namely, as the time variable Ti l .t/ changes by v Zt u u t1 C Ti l .t/ D ti 1

Zt

s

D

Œl

d1 .t 0 / dt 0

1C

dXi l .t 0 / dt 0

!2

2

dt 0

dt 0 ;

ti 1

the space variable Xi l .t/ changes by Œl

Œl

Xi l .t/ D 1 .t/ 1 .ti 1 /: By using (18), we can find that the motion of an elementary part Pi l ; i D 1; : : : ; 16; l D 2; 3; 4 has the following invariant

dTi l .t/ dt

2

dXi l .t/ dt

2

D 1;

while the invariant (16) can be seen as its special case.

36

V. Korotkikh and G. Korotkikh

Therefore, we have considered how the quanta of information of the prime integer relations can be represented by the local spacetimes of elementary parts. Figure 2 helps us to understand the resulting structure of the local spacetimes and illustrates how the simultaneous realization of the prime integer relations, as a solution to the Diophantine equations (3), becomes expressed by using space and time variables. Namely, as the prime integer relations turn to be operational, then in the representation of the quanta of information of the prime integer relations the elementary parts of all levels become instantaneously connected and move simultaneously, so that their local spacetimes can reproduce the prime integer relations geometrically. Thus, the self-organization process of prime integer relations can define a complex information system whose representation in space and time determines the dynamics of the parts preserving the system as a whole.

4 Integration Principle as the Master Equation of the Dynamics of an Information System The holistic nature of the hierarchical network allows us to formulate a single universal objective of a complex system expressed in terms of the integration principle [12–16]: In the hierarchical network of prime integer relations a complex system has to become an integrated part of the corresponding processes or the larger complex system. Significantly, the integration principle determines the general objective of the optimization of a complex system in the hierarchical network. In the realization of the integration principle the geometrical form of the description can play a special role. In particular, the position of a system in the corresponding processes can be associated with a certain two-dimensional shape, which the geometrical pattern of the optimized system has to take precisely to satisfy the integration principle. Therefore, in the realization of the integration principle it is important to compare the current geometrical pattern of the system with the one required for the system by the integration principle. Since the geometrical patterns are two-dimensional, the difference between their areas can be used to estimate the result. Moreover, the fact that in the hierarchical network processes progress level by level in one and the same direction and, as a result, make a system more and more complex, suggests a possible way for the efficient realization of the integration principle. Namely, as the complexity of a system increases level by level, the area of its geometrical pattern may monotonically become larger and larger. Consequently, with each next level l < k the geometrical pattern of the system would fit better into

Integration Principle as the Master Equation of the Dynamics: : :

37

the geometrical pattern specified by the integration principle at level k and deviate more after. In its turn, the performance of the optimized system could increase to attain the global maximum at level l D k. Therefore, the performance of the system might behave as a concave function of the complexity with the global maximum at level k specified by the integration principle. Extensive computational experiments have been successfully conducted to test the prediction. Moreover, the experiments not only support the claim, but also suggest that the integration principle of a complex system could be efficiently realized in general [12, 13]. Let us consider the integration principle in the context of optimization of NP-hard problems. For this purpose an algorithm A, as a complex system of n computational agents, has been used to minimize the average distance in the travelling salesman problem (TSP). In the algorithm all agents start in the same city and choose the next city at random. Then at each step an agent visits the next city by using one of the two strategies: random or greedy. In the solution of a problem with N cities the state of the agents at step j D 1; : : : ; N 1 can be specified by a binary sequence s1j : : : snj , where sij D C1, if agent i D 1; : : : ; n uses the random strategy and sij D 1, if the agent uses the greedy strategy, i.e., the strategy to visit the closest city. The dynamics of the system is realized by the strategies the agents choose step by step and can be encoded by the strategy matrix S D fsij ; i D 1; : : : ; n; j D 1; : : : ; N 1g: In the experiments the complexity of the algorithm has been tried to be changed monotonically by forcing the system to make the transition from regular behavior to chaos by period doubling. To control the system in this transition a parameter #; 0 # 1 has been introduced. It specifies a threshold point dividing the interval of current distances travelled by the agents into two parts, i.e., successful and unsuccessful. This information is required for an optimal if-then rule [17] each agent uses to choose the next strategy. The rule relies on the PTM sequence and has the following description: 1. If the last strategy is successful, continue with the same strategy. 2. If the last strategy is unsuccessful, consult PTM generator which strategy to use next. Remarkably, it has been found that for any problem p from a class P the performance of the algorithm behaves as a concave function of the control parameter with the global maximum at # .p/. The global maximums f# .p/; p 2 Pg have been then probed to find out whether the complexities of the algorithm and the problem are related. For this purpose the strategy matrices fS.# .p//; p 2 Pg corresponding to the global maximums f# .p/; p 2 Pg to characterize the geometrical pattern of the algorithm and its complexity have been tried.

38

V. Korotkikh and G. Korotkikh

In particular, the area of the geometrical pattern and the complexity C.A.p// of the algorithm A are approximated by the quadratic trace C.A.p// D

n 1 1 X 2 2 t r.V .# .p/// D n2 n2 i D1 i

of the variance–covariance matrix V.# .p// obtained from the strategy matrix S.# .p//, where i ; i D 1; : : : ; n are the eigenvalues of V.# .p//. On the other side, the area of the geometrical pattern and the complexity C.p/ of the problem p are approximated by the quadratic trace C.p/ D

N 1 X 02 1 2 t r.M .p// D N2 N 2 i D1 i

of the normalized distance matrix M.p/ D fdij =dmax ; i; j D 1; : : : ; N g; where 0i ; i D 1; : : : ; N are the eigenvalues of M.p/, dij is the distance between cities i and j and dmax is the maximum of the distances. To reveal a possible connection between the complexities the points with the coordinates fx D C.p/; y D C.A.p//; p 2 Pg have been considered. Remarkably, the result indicates a linear dependence between the complexities and suggests the following optimality condition of the algorithm [13]. If the algorithm A demonstrates the optimal performance for a problem p, then the complexity C.A.p// of the algorithm is in the linear relationship C.A.p// D 0:67C.p/ C 0:33 with the complexity C.p/ of the problem p. According to the optimality condition, if the optimal performance takes place, then the complexity of the algorithm has to be in a certain linear relationship with the complexity of the problem. The optimality condition can be a practical tool. Indeed, for a given problem p, by using the normalized distance matrix M.p/, we can calculate the complexity C.p/ of the problem p and from the optimality condition find the complexity C.A.p// of the algorithm A. Then, to obtain the optimal performance of the algorithm A for the problem p, we only need to adjust the control parameter # for the algorithm to work with the required complexity. Since the geometrical pattern of a system is used to define the complexity of the system, the optimality condition may be interpreted in terms of the integration principle. Namely, when the algorithm shows the optimal performance

Integration Principle as the Master Equation of the Dynamics: : :

39

for a problem, the geometrical pattern of the algorithm may fit exactly into the geometrical pattern of the problem. Therefore, the algorithm, as a complex system, may become an integrated part of the processes characterizing the problem. Now let us discuss the computational results in the context of the development of efficient quantum algorithms. The main idea of quantum algorithms is to make use of quantum entanglement, which, as a physical phenomenon, has not been well understood so far. Moreover, the sensitivity of quantum entanglement is not technologically tamed to support the computations [18]. Conceptually, in a quantum TSP algorithm the wave function has to be evolved to maximize the probability of the shortest routes to be measured. However, it is still unknown how to run the evolution in order to make a quantum algorithm efficient. In particular, although the majorization principle [19] suggests a local navigation, it does not specify the properties of the global performance landscape of the algorithm that could make it efficient. By contrast, our approach proposes to explain quantum entanglement in terms of the nonlocal correlations determined by the self-organization processes of prime integer relations. Moreover, according to the description the wave function of a system encodes information about the self-organization processes of prime integer relations the system is defined by [9]. Furthermore, the computational experiments raise the possibility that following the one and the same direction of the processes, the global performance landscape of an algorithm can be made remarkably concave for the algorithm to become efficient. To have a connection with the quantum case the average distance produced by the algorithm A solving a TSP problem can be written as a function of the control parameter # 1 N D.#/ D .1;:::;N 1 .#/d.Œ1; : : : ; N 1 >/ C : : : n CN 1;:::;1 .#/d.ŒN 1; : : : ; 1 >//; where i1 ;:::;iN 1 .#/ is the number of agents using the route Œi1 ; : : : ; iN 1 >, d.Œi1 ; : : : ; iN 1 >/ is the distance of the route and the N cities of the problem are labeled by 0; 1; : : : ; N 1 with 0 for the initial city. The interpretation of the coefficient i1 ;:::;iN 1 .#/ n as the probability of the route Œi1 ; : : : ; iN 1 > may reduce the minimization of the average distance in the algorithm A to the maximization of the probability of the shortest routes to be measured in a quantum algorithm. Moreover, common features of the algorithm A and Shor’s algorithm for integer factorization [20] have been also identified [15].

40

V. Korotkikh and G. Korotkikh

5 Conclusion In the paper we have considered the hierarchical network of prime integer relations as a system of information systems and suggested the integration principle as the master equation of the dynamics of an information system in the hierarchical network. Remarkably, once the integration principle of an information system is realized, the geometrical pattern of the system could take the shape of the geometrical pattern of the problem, while the structures of the information system and the problem would become identical. We hope that the integration principle could open a new way to solve complex problems efficiently [21, 22].

References 1. Korotkikh, V.: Integer Code Series with Some Applications in Dynamical Systems and Complexity. Computing Centre of the Russian Academy of Sciences, Moscow (1993) 2. Korotkikh, V.: A symbolic description of the processes of complex systems. J. Comput. Syst. Sci. Int. 33, 16–26 (1995) translation from Izv. Ross. Akad. Nauk, Tekh. Kibern, 1, 20–31 (1994) 3. Korotkikh, V.: A Mathematical Structure for Emergent Computation. Kluwer Academic Publishers, Dordrecht (1999) 4. Korotkikh, V., Korotkikh, G.: Description of complex systems in terms of self-organization processes of prime integer relations. In: Novak, M.M. (ed.) Complexus Mundi: Emergent Patterns in Nature, pp. 63–72. World Scientific, New Jersey (2006). Available via arXiv:nlin/0509008 5. Korotkikh, V.: Towards an irreducible theory of complex systems. In: Pardalos, P., Grundel, D., Murphey, R., Prokopyev, O. (eds.) Cooperative Networks: Control and Optimization, pp. 147–170. Edward Elgar Publishing, Cheltenham (2008) 6. Korotkikh, V., Korotkikh, G.: On irreducible description of complex systems. Complexity 14(5) 40–46 (2009) 7. Korotkikh, V., Korotkikh, G.: On an irreducible theory of complex systems. In: Minai, A., Braha, D., Bar-Yam, Y. (eds.) Unifying Themes in Complex Systems, pp. 19–26. Springer: Complexity, New England Complex Systems Institute book series, Berlin (2009) 8. Korotkikh, V.: Arithmetic for the unification of quantum mechanics and general relativity. J. Phys. Conf. 174, 012055 (2009) 9. Korotkikh, V.: Integers as a key to understanding quantum mechanics. In: Khrennikov, A. (ed.) Quantum Theory: Reconsideration of Foundations - 5, pp. 321–328. AIP Conference Proceedings, vol. 1232, New York (2010) 10. Korotkikh, V.: On possible implications of self-organization processes through transformation of laws of arithmetic into laws of space and time. arXiv:1009.5342v1 11. Einstein, A.: Relativity: The Special and the General Theory - A Popular Exposition. Routledge, London (1960) 12. Korotkikh, G., Korotkikh, V.: On the role of nonlocal correlations in optimization. In: Pardalos, P., Korotkikh, V. (eds.) Optimization and Industry: New Frontiers, pp. 181–220. Kluwer Academic Publishers, Dordrecht (2003) 13. Korotkikh, V., Korotkikh, G., Bond, D.: On optimality condition of complex systems: computational evidence. arXiv:cs.CC/0504092.

Integration Principle as the Master Equation of the Dynamics: : :

41

14. Korotkikh, V., Korotkikh, G.: On a new type of information processing for efficient management of complex systems. InterJournal of Complex Systems, 2055 (2008) Available via arXiv/0710.3961 15. Korotkikh, V., Korotkikh, G.: On principles in engineering of distributed computing systems. Soft Computing. 12(2), 201–206 (2008) 16. Korotkikh, V., Korotkikh, G.: Complexity of a system as a key to its optimization. In: Pardalos, P., Grundel, D., Murphey, R., Prokopyev, O. (eds.) Cooperative Networks: Control and Optimization, pp. 171–186. Edward Elgar Publishing, Cheltenham (2008) 17. Korotkikh, V.: Multicriteria analysis in problem solving and structural complexity. In: Pardalos, P., Siskos, Y., Zopounidis, C. (eds.) Advances in Multicriteria Analysis, pp. 81–90. Kluwer Academic Publishers, Dordrecht (1995) 18. Gisin, N.: Can relativity be considered complete? From Newtonian nonlocality to quantum nonlocality and beyond. arXiv:quant-ph/0512168 19. Orus, R., Latorre, J., Martin-Delgado, M. A.: Systematic analysis of majorization in quantum algorithms. arXiv:quant-ph/0212094 20. Maity, K., Lakshminarayan, A.: Quantum chaos in the spectrum of operators used in Shor’s algorithm. arXiv:quant-ph/0604111 21. Korotkikh, V., Korotkikh, G.: On principles of developing and functioning of the cyber infrastructure for the Australian coal industry. Coal Supply Chain Cyber Infrastructure Workshop, Babcock & Brown Infrastructure, Level 25, Waterfront Place, Brisbane, August 15 (2006) 22. Korotkikh, G., Korotkikh, V.: From space and time to a deeper reality as a possible way to solve global problems. In: Sayama, H., Minai, A.A., Braha, D., Bar-Yam, Y. (eds.) Unifying Themes in Complex Systems, vol. VIII, pp. 1565–1574. New England Complex Systems Institute Series on Complexity, NECSI Knowledge Press (2011) Available via arXiv:1105.0505v1

On the Optimization of Information Workflow ˜ Rakesh Nagi, Moises Sudit, Michael J. Hirsch, H´ector Ortiz-Pena, and Adam Stotz

Abstract Workflow management systems allow for visibility, control, and automation of some of the business processes. Recently, nonbusiness domains have taken an interest in the management of workflows and the optimal assignment and scheduling of workflow tasks to users across a network. This research aims at developing a rigorous mathematical programming formulation of the workflow optimization problem. The resulting formulation is nonlinear, but a linearized version is produced. In addition, two heuristics (a decoupled heuristic and a greedy randomized adaptive search procedure (GRASP) heuristic) are developed to find solutions quicker than the original formulation. Computational experiments are presented showing that the GRASP approach performs no worse than the other two approaches, finding solutions in a fraction of the time. Keywords Workflow optimization • Decomposition • Nonlinear mathematical program

heuristic • GRASP

M.J. Hirsch () Raytheon Company, Intelligence and Information Systems, 300 Sentinel Drive, Annapolis Junction, MD 20701, USA e-mail: [email protected] H. Ortiz-Pe˜na • M. Sudit • A. Stotz CUBRC, 4455 Genesee Street, Buffalo, NY 14225, USA e-mail: [email protected]; [email protected]; [email protected] R. Nagi Department of Industrial and Systems Engineering, University at Buffalo, 438 Bell Hall, Buffalo, NY 14260, USA e-mail: [email protected] A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 3, © Springer Science+Business Media New York 2012

43

44

M.J. Hirsch et al.

1 Introduction In general, a workflow management system (WfMS) allows for control and assessment of the tasks (or activities) associated with a business process, defined in a workflow. A workflow is a model of a process, consisting of a set of tasks, users, roles, and a control flow that captures the interdependencies among tasks. The control flow can be defined explicitly by indicating precedence relationships among the tasks, or indirectly by the information requirements (e.g., documents, messages) in order to perform the tasks. WfMS has emerged as an important technology for automating business processes, drawing increasing attention from researchers. Ludascher et al. [9] provide a thorough introduction to workflows and present a few scientific workflow examples. Georgakopoulos et al. [7] discussed three different types of workflows: ad hoc, administrative, and production. Ad hoc workflows perform standard office processes, where there is no set pattern for information flow across the workflow. Administrative workflows involve repetitive and predictable business processes, such as loan applications or insurance claims. Production workflows, on the other hand, typically encompass a complex information process involving access to multiple information systems. The ordering and coordination of tasks in such workflows can be automated. However, automation of production workflows is complicated due to: (a) information process complexity, and (b) accesses to multiple information systems to perform work and retrieve data for making decisions (to contrast, administrative workflows rely on humans for most of the decisions and work performed). WfMSs that support production workflow must provide facilities to define task dependencies and control task execution with little or no human interaction. Production WfMSs are often mission critical in nature and must deal with the integration and interoperability of heterogeneous, autonomous, and/or distributed information systems. There are many different items to consider with WfMS. One key aspect is the optimal assignment and scheduling of the tasks in a workflow. Joshi [8] discussed the problem of workflow scheduling aiming to achieve cost reduction through an optimal assignment and scheduling of workflows. Each workflow was characterized by a unique due date and tardiness penalty. The problem is formulated as a mixed integer linear program (MILP). The model assumed that the dependencies and precedence relationships among the workflows are deterministic and unique. Tasks are not preemptive and the processing times and due dates are also deterministic and known. Users can assume several roles but can perform only one task at a time. The total cost component which the model tries to minimize consists of two elements: processing cost and tardiness penalty cost. Processing cost refers to the price charged by the user to perform the assigned tasks; tardiness penalty cost refers to the product of a unit tardiness penalty for the workflow and the time period by which it is late (with respect to its assigned due date). A branch and price approach was proposed to solve the problem. Moreover, an acyclic graph heuristic was developed to solve the sub-problems of this approach. The proposed algorithm was used to solve static and reactive situations. Reactive scheduling (or rescheduling) is

On the Optimization of Information Workflow

45

the process of revising a given schedule due to unexpected events. Events considered by the author included: change in priority of a workflow, change in processing time of tasks, and the addition of new workflows. The results of a computational study indicate the benefits of using reactive strategies when the magnitude and frequency of changes increase. Nukala [10] described the software implementation details (e.g., architecture, data files manipulation, etc.) while developing the schedule deployer and POOL (Process Oriented OpenWFE Lisp) updater (SDPU) application which uses the algorithm described in Joshi [8] as the workflow scheduler. Xiao et al. [15] proposed an optimization method of workflow pre-scheduling based on a nested genetic algorithm (NGA). By pre-scheduling, the authors refer to the scheduling of all tasks when the workflow is initialized (as opposed to, e.g., reactive workflow scheduling in which tasks might be scheduled even when the workflow is active and some tasks have already been completed). The problem can then be described as finding the optimal precedence and resource allocation such that the finish time of the last task is minimized. NGA uses nested layers to optimize several variables. For this approach, two variables were considered: an inner layer referring to the allocation of resources and an outer layer referring to the execution sequence of tasks. The solutions found by the NGA algorithm were better than the solutions found by a dynamic method consisting of a greedy heuristic that assigned the resource able to complete the task fastest to execute the task. Dewan et al. [2] presented a mathematical model to optimally consolidate tasks to reduce the overall cycle time in a business information process. Consolidation of tasks may reduce or eliminate cost losses and delays due to the required communication and information hand-off between tasks. On the other hand, consolidation represents loss of specialization, which may result in larger process time. Using this formulation, the authors analytically and numerically present the impact of delay costs, hand-off, and loss of specialization on the benefits of tasks consolidation. In Zhang et al. [17], the authors considered quality-of service (QoS) optimization, by minimizing the number of machines, subject to customer response time and throughput requirements. They propose an efficient algorithm that decomposes the composite-service level response time requirements into atomic-service level response time requirements that are proportional to the CPU consumption of the atomic services. Binary search was incorporated in their algorithm to identify the maximum throughput that can be supported by a set of machines. A greedy algorithm was used for the deployment of services across machines. Zhang et al. [18] presented research on grid workflow and dynamic scheduling. The “grid” refers to a new computing infrastructure consisting of large-scale resource sharing and distributed system integration. Grid workflow is similar to traditional workflow but most of grid applications are, however, high performance computing and data intensive requiring efficient, adaptive use of available grid resources. The scheduling of a workflow engine has two types: static scheduling and dynamic scheduling. The static scheduling allocates needed resources according to the workflow process description. The dynamic scheduling also allocates resources according to the process description but takes into account the conditions of grid resources. Although

46

M.J. Hirsch et al.

the authors indicated that the resources can be scheduled according to QoS and performance, the algorithm only considers the latter. The grid workflow modeling on this research is based on petri nets. Xianwen et al. [14] presented a dependent task static scheduling problem considering the dynamics and heterogeneity of the grid resources. A reduced taskresource assignment graph (RT-RAG)-based scheduling model and an immune generic algorithm (IGA) scheduling algorithm were proposed. The RT-RAG is expressed as a 4-tuple < V; E; W V; WE > in which V represents the set of nodes, E represents the set of precedence constraints, W V represents the node weight, and WE represents the edges weight. The nodes express a mapping from a task to a resource, the node weights express communication data, and the edge weights include the computation cost and the bandwidth constraints. The RT-RAG is derived from the task graph (including all tasks) by applying a “reduction rule” which removes all tasks that are finished. The proposed IGA performed better than the adaptive heterogeneous earliest finish time (HEFT)-based Rescheduling (AHEFT) algorithm [16] and the dynamic scheduling algorithm Min-Max [11] in the experiments conducted by the authors. It was indicated in the paper that the initial parameters of IGA were critical to the performance of the algorithm. Tao et al. [13] proposed and evaluated the performance of the rotary hybrid discrete particle swarm optimization (RHDPSO) algorithm for the multi-QoS constrained grid workflow scheduling problem. This grid system selects services from candidate services according to the parameters set by a user to complete the grid scheduling. QoS was defined as a six-tuple (Time, Cost, Reliability, Availability, Reputation, Security) to characterize the service quality. Time measures the speed of a service response. This is expressed as the sum of the service execution time and service communication time. Cost describes the total cost of service execution. Reliability indicates the probability of the service being executed successfully. Availability measures the ability of the service to finish in the prescriptive time. The value of availability is computed using the ratio of service execution time and the prescriptive time. Reputation is a measure of service “trustworthiness” and it is expressed as the average ranking given by users. Security is a measure indicating the possibility of the service being attacked or damaged. The higher this value, the lower this possibility. The advantage of the RHDPSO algorithm over a discrete particle swarm optimization algorithm is its speed of convergence and the ability to obtain faster and feasible schedules. In our research, we are concerned with information workflows. Information is generated by some tasks (i.e., produced as output) and consumed by other tasks (i.e., needed as input). There are multiple information workflows, with multiple tasks, that need to be assigned to users. Users can take on certain roles, and tasks can only be performed by users with certain roles. The tasks themselves can have precedence relationships. Overall, the goal is to minimize the time at which the last task gets completed. We formulated the assignment and scheduling of tasks to users, and the information flow amongst the users as a mixed-integer nonlinear program (MINLP). The flow of information considered the required information by certain

On the Optimization of Information Workflow

47

tasks (as input), the information produced by tasks (as output), and precedence relationships between tasks. In addition to linearizing the MINLP, two heuristics were developed; a decomposition heuristic and the construction phase of a greedy randomized adaptive search procedure (GRASP). The rest of this paper is organized as follows: Sect. 2 describes the MINLP formulation for the information workflow problem, as well as the linearization. In Sect. 3, a detailed description of the two heuristic approaches considered to solve the MILNP is provided. A computational study and analysis is presented in Sect. 4. Finally, conclusions and future research are discussed in Sect. 5.

2 Mathematical Formulations 2.1 Problem Definition The overall problem addressed here is to assign tasks occurring on multiple information workflows to users, and flow information amongst the users, from tasks that produce information as output to tasks that require the information as input. Each task can only be assigned to a user if the task roles and the user roles overlap. Users have processing times to accomplish tasks. There are precedence relationships between the tasks (e.g., Task k must be completed before Task m can start). In addition, tasks might require certain information as input before they can begin, and tasks might generate information as output when they are completed. If a task needs a certain piece of information as input (e.g., ˛), there needs to be an assignment of the transference of ˛ from a user assigned a task producing ˛ as output to the user assigned the task requiring ˛ as input. We are assuming in this research that the transference of information from one user to another is instantaneous, i.e., that there is infinite bandwidth. In the sequel we will consider the case of finite uplink and downlink bandwidth. We note that we use the term “user” rather loosely. A user could be an human performing a task, as well as an automated system performing a task. We also make the assumption that two tasks assigned to one user cannot be accomplished simultaneously, i.e., once a user starts one task, that task needs to be completed before the user can move on to the next task it is assigned. Figure 1 presents an example scenario. In this scenario, there are two workflows. The goal is to assign the tasks on the workflows to users, schedule the tasks assigned to each user, and determine the appropriate information transfers that need to take place among the users, and when those information transformations need to be performed. In this figure, the tasks are color-coded by the user assignments, and the information flows detailed. In this example scenario, User 1 is first assigned to perform Task 1 (on workflow 1). When Task 1 is completed, and User 1 receives information from User 3, then User 1 can begin its next task, Task 3 (on workflow 2). Once complete with Task 3, User 1 can begin Task 8 (on workflow 2).

48

M.J. Hirsch et al.

User 2

User 3

Task10

Task4 User 1

Information b

Task1 User 3

Task6

User 2

Task9 Workflow 1

Information a

Information w Information m

User 3

Task2

User 1

Task3

User 3

Task5 User 4

Task7

User 2

Task11

User 1

Task8 Workflow 2 Fig. 1 Multiple information workflows, with users assigned to tasks, and information flow defined across users

2.2 Parameters This section introduces the parameters incorporated into the information workflow optimization formulation. For the mathematical formulation to follow, the parameters, decision variables, and constraints are defined for all i 2 f1; : : : ; T g, j 2 f1; : : : ; Pg, q 2 f1; : : : ; Qg, and n 2 f1; : : : ; N g. (N.B.: It is possible for N to be 0; the case when there is no information artifacts produced as possible outputs of some tasks and/or inputs of other tasks. In that case, all constraints and decision variables that use n as an index drop out of the nonlinear and linearized formulations.) T 2 ZC defines the number of activities (indexed by i ). P 2 ZC defines the number of users (indexed by j ). ij 2 RC [ f0g defines the processing time of activity i by user j . Q 2 ZC defines the number of possible roles (indexed by q). N 2 ZC [ f0g defines the number of possible inputs / outputs of all activities on all workflows—called information artifacts (indexed by n).

On the Optimization of Information Workflow

49

( Rj is binary vector of length Q, where Rj q D

1 if user j can perform role q

. 0 o.w. 8 ˆ 1), and as the parameter value decreases, it becomes non-convex. For D 1 it approximates the hinge loss function (hinge loss function is a typical function often used in SVMs). However, for smaller values of kernel width the function almost approximates the 0–1 loss function, which is mostly an unexplored territory for typical classification problems. In fact, any value of kernel width apart from D 2 or 1 has not been studied for other loss functions. This peculiar property of correntropic function can be harmoniously used with the concept of convolution smoothing for finding global optimal solutions. Moreover, with a fixed lower value of kernel width, suitable global optimization algorithms (heuristics like simulated annealing) can be used to find the global optimal solution. In the following sections, elementary ideas about different optimization algorithms that can be used with the correntropic loss function are discussed.

2.3 Convolution Smoothing A convolution smoothing (CS) approach2 forms the basis for one of the proposed methods of correntropic risk minimization. The main idea of CS approach is sequential learning, where the algorithm starts from a high kernel width correntropic loss function and smoothly moves towards a low kernel width correntropic loss function (approximating original loss function). The suitability of this approach can be seen in [29], where the authors used a two-step approach for finding the global optimal solution. The current proposed method is a generalization of the two-step approach. Before discussing the proposed method, consider the following basic framework of CS. A general unconstrained optimization problem is defined as minimizeW g.u/

(13a)

u 2 Rn ;

(13b)

subject toW

2

A general approach for solving non-convex problems via convolution smoothing was proposed by Styblinski and Tang [30] in 1990.

90

M.N. Syed et al.

a

3.5 σ=2 3

2.5 σ=1 F σe

2

1.5 σ = 0.5 1

0-1 Loss

0.5

0 −1

−0.8

−0.6

−0.4

−0.2 0 0.2 margin α →

0.4

0.6

0.8

1

−0.4

−0.2

0.4

0.6

0.8

1

b 1 0-1 Loss 0.9 0.8 0.7

σ = 0.5 σ=1 σ=2

F σe

0.6 0.5 0.4 0.3 0.2 0.1 0 −1

−0.8

−0.6

0 0.2 error ε →

Fig. 1 Correntropic function and 0–1 loss function

Correntropy in Data Classification

91

where g W Rn 7! R. The complexity of solving such problems depends upon the nature of function g. If g is convex in nature, then a simple gradient descent method will lead to the global optimal solution. Whereas, if g is non-convex, then gradient descent algorithm will behave poorly, and converges to a local optimal solution (or in the worst case converges to a stationary point). CS is a heuristic-based global optimization method to solve problems of type (13) when g is non-convex. This is a specialized stochastic approximation method introduced in [24]. Usage of convolution in solving convex optimization problems was first proposed in [3]. Later, as an extension, a generalized method for solving non-convex unconstrained problems is proposed in [26]. The main motivation behind CS is that the global optimal solution of a multi-extremal function g can be obtained by the information of a local optimal solution of its smoothed function. It is assumed that the function g is a convoluted function of a convex function g0 and other non-convex functions gi 8 D 1; : : : ; n. The other non-convex functions can be seen as noise added to the convex function g0 . In practice g0 is intangible, i.e., it is impractical to obtain a deconvolution of g into gi ’s, such that argminu fg.u/g D argminu fg0 .u/g. In order to overcome this difficulty, a smoothed approximation function b g is used. This smoothed function has the following main property: b g .u; / ! g.u/

as ! 0;

(14)

where is the smoothing parameter. For higher values of , the function is highly smooth (nearly convex), and as the value of tends towards zero, the function takes the shape of original non-convex function g. Such smoothed function can be defined as Z 1 b h..u v/; / g.v/ dv; (15) b g .u; / D 1

where b h.v; / is a kernel function, with the following properties: • • •

b h.v; / ! ı.v/; as ! 0; where ı.v/ is Dirac’s delta function. b h.v; / is a probability distribution function. b h.v; / is a piecewise differentiable function with respect to u. Moreover, the smoothed gradient of b g .u; / can be expressed as Z

1

rb g .u; / D

rb h.v; / g.u v/ dv:

(16)

1

Equation (16) highlights a very important aspect of CS, it states that information of rg.v/ is not required for obtaining the smoothed gradient. This is one of the crucial aspects of smoothed gradient that can be easily extended for non-smooth optimization problems, where rg.v/ does not usually exist.

92

M.N. Syed et al.

Furthermore, the objective of CS is to find the global optimal solution of function g. However, based on the level of smoothness, a local optimal solution of the smoothed function may not coincide with the global optimal solution of the original function. Therefore, a series of sequential optimizations are required with different level of smoothness. Usually, at first, a high value of is set, and an optimal solution u? is obtained. Taking u? as the starting point, the value of is reduced and a new optimal value in the neighborhood of u? is obtained. This procedure is repeated until the value of is reduced to zero. The idea behind these sequential optimizations is to end up in a neighborhood of u? as ! 0, i.e., u? ! u?

as ! 0;

(17)

where u? D argminfg.u/g. The crucial part in the CS approach is the decrement of the smoothing parameter. Different algorithms can be devised to decrement the smoothing parameter. In [30] a heuristic method (similar to simulated annealing) is proposed to decrease the smoothing parameter. Apparently, the main difficulty of using the CS method to any optimization problem is defining a smoothed function with the property given by (14). However, the CS can be used efficiently with the proposed correntropic loss function, as the correntropic loss function can be seen as a generalized smoothed function for the true loss function (see Fig. 1). The kernel width of correntropic loss function can be visualized as the smoothing parameter. Therefore, the CS method is applicable in solving the classification problem, when suitable kernel width is unknown a priori (a practical situation). On the other hand, if appropriate value of kernel is width known a priori (maybe an impractical assumption, but quiet possible), then other efficient methods may be developed. If the known value of kernel width in the correntropic loss function results into a convex function, then any gradient descent based method can be used. However, when the resulting correntropic loss function is non-convex, then global optimization approaches should be used. Specifically, for such cases (when the correntropic loss function results in a non-convex function) the use of simulated annealing is proposed. In the following section, the basic description of simulated annealing is presented.

2.4 Simulated Annealing Simulated annealing (SA) is a meta-heuristic method which is employed to find a good solution to an optimization problem. This method stems from thermal annealing which aims to obtain a perfect crystalline structure (lowest energy state possible) by a slow temperature reduction. Metropolis et al. in 1953 simulated this processes of material cooling [6], Kirkpatrick et al. applied the simulation method for solving optimization problems [13, 20].

Correntropy in Data Classification

93

Simulated annealing can be viewed as an upgraded version of greedy neighborhood search. In neighborhood search method, a neighborhood structure is defined in the solution space, and the neighborhood of a current solution is searched for a better solution. The main disadvantage of this type of search is its tendency to converge to a local optimal solution. SA tackles this drawback by using concepts from Hill-climbing methods [17]. In SA, any neighborhood solution of the current solution is evaluated and accepted with a probability. If the new solution is better than the current solution, then it will replace the current solution with probability 1. Whereas, if the new solution is worse than the current solution, then the acceptance probability depends upon the control parameters (temperature and change in energy). During the early iterations of the algorithm, temperature is kept high, and this results in a high probability of accepting worse new solutions. After a predetermined number of iterations, the temperature is reduced strategically, and thus the probability of accepting a new worse solution is reduced. These iterations will continue until any of the termination criteria is met. The use of high temperature at the earlier iterations (low temperature at the later iterations) can be viewed as exploration (exploitation, respectively) of the feasible solution space. As each new solution is accepted with a probability it is also known as stochastic method. A complete treatment of SA and its applications is carried out in [23]. Neighborhood selection strategies are discussed in [1]. Convergence criteria of SA are presented in [14]. In this work, SA will be used to train the correntropic loss function when the information of kernel width is known a priori. Although the assumption of known kernel width seems implausible, any known information of an unknown variable will increase the efficiency of solving an optimization problem. Moreover, a comprehensive knowledge of data may provide the appropriate kernel width that can be used in the loss function. Nevertheless, when kernel width in unknown, a grid search can be performed on the kernel width space to obtain appropriate kernel width that maximizes the classification accuracy (this is a typical approach while using kernel-based soft margin SVMs, which generally involves grid search over a two dimensional parameter space). b ) is addressed. In the current So far, no discussion about the function class ( work, a nonparametric function class namely artificial neural networks, and a parametric function class namely support vector machines is considered. In the following section, an introductory review of artificial neural networks is presented.

2.5 Artificial Neural Networks Curiosity of studying the human brain led to the development of ANNs. Henceforth, ANNs are the mathematical models that share some of the properties of brain functions, such as nonlinearity, adaptability, and distributed computations. The first mathematical model that depicted a working ANN used the perceptron, proposed by McCulloch and Pitts [15]. The actual adaptable perceptron model is credited to

94

M.N. Syed et al.

Fig. 2 Perceptron

Rosenblatt [25]. The perceptron is a simple single layer neuron model, which uses a learning rule similar to gradient descent. However, the simplicity of this model (single layer) limits its applicability to model complex practical problems; thereby, it was an object of censure in [19]. However, a question which instigated the use of multilayer neural networks was kindled in [19]. After a couple of decades of research, neural network research exploded with impressive success. Furthermore, multilayered feedforward neural networks are rigorously established as a function class of universal approximators [11]. In addition to that, different models of ANNs were proposed to solve combinatorial optimization problems. Furthermore, the convergence conditions for the ANNs optimization models have been extensively analyzed [31]. Processing elements (PEs) are the primary elements of any ANN. The state of PE can take any real value between the interval Œ0; 1 (some authors prefer to use the values between [1,1]; however, both definitions are interchangeable and have the same convergence behavior). The main characteristic of a PE is to do function embedding. In order to understand this phenomenon, consider a single PE ANN model (the perceptron model) with n inputs and Pone output, shown in Fig. 2. The total information incident on the PE is niD1 wi xi . PE embeds this information into a transfer function , and sends the output to the following layer. Since there is a single layer in the example, the output from the PE is considered as the final output. Moreover, if we define as ! ( P n X 1 if niD1 wi xi C b 0; wi xi C b D (18) 0 otherwise; i D1 where b is the threshold level of the PE, then the single PE perceptron can be used for binary classification, given the data is linearly separable. The difference

Correntropy in Data Classification

95

between this simple perceptron method of classification, and support vector-based classification is that the perceptron finds a plane that linearly separates the data; however, support vector finds the plane with maximum margin. This does not indicate superiority of one method over the other method since a single PE is considered. In fact, this shows the capability of a single PE; however, a single PE is incapable to process complex information that is required for most practical problems. Therefore, multiple PEs in multiple layers are used as universal classifiers. The PEs interact with each other via links to share the available information. The intensity and sense of interactions between any two connecting PEs is represented by weight (or synaptic weight, the term synaptic is related to the nervous system, and is used in ANNs to indicate the weight between any two PEs) on the links. Usually, PEs in the .r 1/th layer send information to the r th layer using the following feedforward rule: 0 1 X yi D i @ wj i yj Ui A ; (19) j 2.r1/

where PE i belongs to the r th layer, and any PE j belongs to the .r 1/th layer. yi represents the state of the i th PE, wj i represents weight between the j th PE and i th PE, and Ui represents threshold level of the i th PE. Function i ./ is the transfer function for the i th PE. Once the PEs in the final layer are updated, the error from the actual output is calculated using a loss function (this is the part where correntropic loss function will be injected). The error or loss calculation marks the end of feed forward phase of ANNs. Based on the error information, back-propagation phase of ANNs starts. In this phase, the error information is utilized to update the weights, using the following rules: wj k D wj k C ık yj ;

(20)

where @F ."/ 0 .netk /; (21) @"n P where is the learning step size, netk D j 2.r1/ wj i yj Uk , and F ."/ is the error function (or loss function). For the output layer, the weights are computed as ık D

@F ."/ 0 .netk /; @" D .y y0 / 0 .netk /;

ık D ı0 D

(22)

and the deltas of the previous layers are updated as ık D ıh D 0 .netk /

N0 X oD1

who ıo :

(23)

96

M.N. Syed et al.

In the proposed approaches, ANN is trained in order to minimize the correntropic loss function. In total, two different approaches to train ANN are proposed. In one approach, ANN will be trained using the CS algorithm. Whereas in the other proposed approach, ANN will be trained using the SA algorithm. In order to validate our results, we will not only compare the proposed approaches with conventional ANN training methods, but also compare them with the support vector machines based classification method. In the following section, a review of support vector machines is presented.

2.6 Support Vector Machines A support vector machine (SVM) is a popular supervised learning method [5, 7]. It has been developed for binary classification problems, but can be extended to multiclass classification problems [9,33,36] and it has been applied in many areas of engineering and biomedicine [10,12,21,32,37]. In general supervised classification algorithms provide a classification rule able to decide the class of an unknown sample. In particular the goal of SVMs training phase is to find a hyperplane that “optimally” separates the data samples that belong to a class. More precisely SVM is a particular case of hyperplane separation. The basic idea of SVM is to separate two classes (say A and B) by a hyperplane defined as f .x/ D wt x C b;

(24)

such that f .a/ < 0 when a 2 A, and f .b/ > 0 when b 2 B. However, there could be infinitely many possible ways to select w. The goal of SVM is to choose a best w according to a criterion (usually the one that maximizes the margin), so that the risk of misclassifying a new unlabeled data point is minimum. A best separating hyperplane for unknown data will be the one, that is sufficiently far from both the classes (it is the basic notion of SRM), i.e., a hyperplane which is in the middle of the following two parallel hyperplanes (support hyperplanes) can be used as a separating hyperplane: wt x C b D c; t

w x C b D c:

(25) (26)

Since, w; b, and c are all parameters, a suitable normalization will lead to wt x C b D 1;

(27)

wt x C b D 1:

(28)

Moreover, the distance between the supporting hyperplanes (27) and (28) is given by 2 : (29)

D jjwjj

Correntropy in Data Classification

97

In order to obtain the best separating hyperplane, the following optimization problem is solved: maximizeW 2 jjwjj

(30a)

yi .wt xi C b/ 1 0 8i:

(30b)

subject toW

The objective given in (30a) is replaced by minimizing jjwjj2 =2. Usually, the solution to problem (30) is obtained by solving its dual. In order to obtain the dual, consider the Lagrangian of (30), given as N X 1 2 ui yi .wt xi C b/ 1 ; L.w; b; u/ D jjwjj 2 i D1

(31)

where ui 0 8 i . Now, observe that problem (30) is convex. Therefore, the strong duality holds, and the following equation is valid: min max L.w; b; u/ D max min L.w; b; u/:

.w;b/

u

u

.w;b/

(32)

Moreover, from the saddle point theory [4], the following hold: wD

N X

ui yi xi ;

(33)

i D1 N X

ui yi D 0:

(34)

i D1

Therefore, using (33) and (34), the dual of (30) is given as maximizeW N X i D1

ui

N 1 X ui uj yi yj xi t xj 2 i;j D1

(35a)

subject toW N X

ui yi D 0;

(35b)

i D1

ui 0 8i:

(35c)

98

M.N. Syed et al.

Thus, solving (35) results in obtaining support vectors, which in turn leads to the optimal hyperplane. This phase of SVM is called as training phase. The testing phase is simple and can be stated as ( 1; test 2 A if f .xtest / < 0, ytest D (36) C1; test 2 B if f .xtest / > 0. The above method works very well when the data is linearly separable. However, most of the practical problems are not linearly separable. In order to extend the usability of SVMs, soft margins and kernel transformation are incorporated in the basic linear formulation. When considering soft margin, (30a) is modified as yi .wt xi C b/ 1 C si 0

8i;

(37)

where si 0 are slack variables. The primal formulation is then updated as minimizeW N X 1 jjwjj2 C c si 2 i D1

(38a)

subject toW yi .wt xi C b/ 1 C si 0

8i;

si 0 8i:

(38b) (38c)

Similar to the linear SVM, the Lagrangian of formulation (38) is given by L.w; b; u; v/ D

N N X X 1 si ui yi .wt xi C b/ 1 vt s; jjwjj2 C c 2 i D1 i D1

(39)

where ui ; vi 0 8 i . Correspondingly, using the theory of saddle point and strong duality, the soft margin SVM dual is defined as maximizeW N X

ui

i D1

N 1 X ui uj yi yj xi t xj 2 i;j D1

(40a)

subject toW N X

ui yi D 0;

(40b)

i D1

ui c

8i;

(40c)

ui 0 8i:

(40d)

Correntropy in Data Classification

99

Furthermore, the dot product ”xi t xj ” in (40a) is exploited to overcome the nonlinearity, i.e., by using kernel transformations into a higher dimensional space. Thus, the soft margin kernel SVM has the following dual formulation: maximizeW N X

N 1 X ui ui uj yi yj K.xi ; xj / 2 i;j D1 i D1

(41a)

subject toW N X

ui yi D 0;

(41b)

i D1

ui c

8i;

(41c)

ui 0

8i;

(41d)

where K.:; :/ is any symmetric kernel. In this chapter, a Gaussian kernel is used, which is defined as 2

K.xi ; xj / D e jjxi xj jj ;

(42)

where > 0. Therefore, in order to classify the data, two parameters (c; ) should be given a priori. The information about the parameters is obtained from the knowledge and structure of the input data. However, this information is intangible for practical problems. Thus, an exhaustive logarithmic grid search is conducted over the parameter space to find their suitable values. It is worthwhile to mention that assuming c and as variables for the kernel SVM, and letting the kernel SVM try to obtain the optimal values of c and , makes the classification problem (41) intractable. Once the parameter values are obtained from the grid search, the kernel SVM is trained to obtain the support vectors. Usually the training phase of the kernel SVM is performed in combination with a re-sampling method called cross validation. During cross validation the existing data set is partitioned in two parts (training and testing). The model is built based on the training data, and its performance is evaluated using the testing data. In [28], a general method to select data for training SVM is discussed. Different combinations of training and testing sets are used to calculate average accuracy. This process is mainly followed in order to avoid manipulation of classification accuracy results due to a particular choice of the training and testing datasets. Finally the classification accuracy reported is the average classification accuracy for all the cross validation iterations. There are several cross validation methods available to built the training and testing sets. Next, three most common methods of cross validation are described: • k-Fold cross validation (kCV): In this method, the data set is partitioned in k equally sized groups of samples (folds). In every cross validation iteration k 1 folds are used for the training and 1 fold is used for the testing. In the literature usually k takes a value from 1; : : : ; 10.

100

M.N. Syed et al.

• Leave one out cross validation (LOOCV): In this method, each sample represents one fold. Particularly, this method is used when the number of samples are small, or when the goal of classification is to detect outliers (samples with particular properties that do not resemble the other samples of their class). • Repeated random subsampling cross validation (RRSCV): In this method, the data set is partitioned into two random sets, namely training set and validation (or testing) set. In every cross validation, the training set is used to train the SVM and the testing (or validation) set to test the accuracy of SVM. This method is preferred, if there are large number of samples in the data. The advantage of this method (over k-fold cross validation) is that the proportion of the training set and number of iterations are independent. However, the main drawback of this method is, if few cross validations are performed, then some observations may never be selected in the training phase (or the testing phase), whereas others may be selected more than once in the training phase (or the testing phase, respectively). To overcome this difficulty, the kernel SVM is cross validated sufficiently large number of times, so that each sample is selected atleast once for training as well as testing the kernel SVM. These multiple cross validations also exhibits Monte Carlo variation (since the training and testing sets are chosen randomly). In this chapter, the RRSCV method is used to train the kernel SVM, the performance accuracy of the SVM is compared with the proposed approaches. In the next section, the different learning methodologies used to train ANNs and SVMs will be discussed.

3 Obtaining an Optimal Classification Rule Function The goal of any learning algorithm is to obtain the optimal rule f ? by solving the classification problem illustrated in formulation (6). Based on the type of loss function used in risk estimation, the type of information representation, and the type of optimization algorithm, different classification algorithms can be designed. In this section, five different classification methods, two of them are novel and the rest are conventional methods (used for comparison with novel methods), will be discussed. A summary of the classification methods is listed in Table 1. In the following part of this section, each of the listed methods will be explained.

3.1 Conventional Nonparametric Approaches A classical method of classification using ANN involves training a multilayer perceptron (MLP) using a back-propagation algorithm. Usually, a signmodal function is used as an activation function, and a quadratic loss function is used for error

Correntropy in Data Classification

101

Table 1 Notation and description of proposed (z) and existing (X) methods Notation Information representation Loss function Optimization algorithm AQGX Nonparametric (ANN) Quadratic Exact method— gradient descent Nonparametric (ANN) Initially quadratic, shifts ACG X Exact method— gradient to correntropy with descent fixed kernel width Nonparametric (ANN) Correntropy with varying Heuristic method— ACCz kernel width convolution smoothing Nonparametric (ANN) Correntropy with fixed Heuristic method— ACSz kernel width simulated annealing Parametric (SVM) Quadratic with Gaussian Exact method— quadratic SGQX kernel optimization

measurement. The ANN is trained using a back-propagation algorithm involving gradient descent method [16]. Before proceeding further to present the training algorithms, let us define the notations: wnjk : The weight between the k th and j th PEs at the nth iteration. yjn : Output of the j th PE at the nth iteration. P n n n th netkn D j wj k yj : Weighted sum of all outputs yj of the previous layer at n iteration. ./: Sigmoidal squashing function in each PE, defined as: .z/ D

1 e2 : 1 C e2

ykn D .netkn /: Output of k th PE of the current layer, at the nth iteration. y n 2 f˙1g: The true label (actual label) for the nth sample. In the following part of this section, two training algorithms (AQG and ACG) will be described. These algorithms differ in the type of loss function used to train ANNs.

3.1.1 Training ANN with Quadratic Loss Function Using Gradient Descent Training ANN with quadratic loss function using gradient descent (AQG) is the simplest and most widely known method of training ANN. A three layered ANN (input, hidden, and output layers) is trained using a back-propagation algorithm. Specifically, the generalized delta rule is used to update the weights of ANN, and the training equations are n n n wnC1 j k D wj k C ık yj ;

(43)

102

M.N. Syed et al.

where ıkn D

@MSE."/ 0 .netnk /; @"n

(44)

where is the learning step size, " D .y n y0n / is the error (or loss), and M SE."/ is the mean square error. For the output layer, the weights are computed as ıkn D ı0n D

@MSE."/ 0 .netnk /; @"n

D .y n y0n / 0 .netnk /;

(45)

The deltas of the previous layers are updated as ıkn D ıhn D 0 .netnk /

N0 X

wnho ıon :

(46)

oD1

3.1.2 Training ANN with Correntropic Loss Function Using Gradient Descent Training ANN with correntropic loss function using gradient descent (ACG) method is similar to AQG method, the only difference is the use of correntropic loss function instead of quadratic loss function. Furthermore, the kernel width of correntropic loss is fixed to a smaller value (in [29], a value of 0.5 is illustrated to perform well). Moreover, since the correntropic function is non-convex at that kernel width, the ANN is trained with a quadratic loss function for some initial epochs. After sufficient number of epochs (ACG1 ), the loss function is changed to correntropic loss function. Thus (ACG1 ) is a parameter of the algorithm. The reason for using quadratic loss function at the initial epochs is to prevent converging at a local minimum at early learning stages. Similar to AQG, the delta rule is used to update the weights of ANN, and the training equations are: n n n wnC1 j k D wj k C ık yj ;

(47)

where ıkn D

@F ."/ 0 .netnk /; @"n

(48)

where is the step length, and F ."/ is a general loss function, which can be either quadratic or correntropic function based on the current number of training epochs. For the output layer, the weights are computed as

Correntropy in Data Classification

ıkn D ı0n D D

8 0; i D 1; : : : ; N; (43)

j D1 N X

N ij 1; 0; j D 1; : : : ; M;

(44)

i D1

0 N ij 1; i D 1; : : : ; N; j D 1; : : : ; M:

(45)

Qi1 ,

By introducing the slack variable Ri such that Ri the problem (42) can be written as the semidefinite program given by (27) with constraints (28)–(31). t u

3.2 Approximate Solution that Approaches the Lower Bound By solving the semidefinite program (27), we can obtain the lower bound of the average cost (23) in the original sensor scheduling problem. The resulting fN ij g may take non-integer values within Œ0; 1 and Qi can be interpreted as the optimal long-term information matrix of object i corresponding to the maximum Fisher information that one would hope to obtain by utilizing the available sensing resources. Denote by ˘N D ŒN ij the sensor-to-object association matrix that solves the semidefinite program (27). We want to decompose ˘N to a linear combination of feasible sensor-to-object assignment matrices. Theorem 2. For any matrix ˘N that satisfies N X i D1

N ij 1; j D 1; : : : ; M; 0 N ij 1; i D 1; : : : ; N; j D 1; : : : ; M;

(46)

Sensor Scheduling for Space Object Tracking and Collision Alert

185

there exists some integer K such that ˘N D

K X

wk Pk

(47)

kD1

with wk > 0; k D 1; : : : ; K

(48)

and fPk g’s are feasible sensor-to-object assignment matrices. Proof. For M D 1, if N i1 ¤ 0, we can set wi D N i1 and Pi has a single nonzero entry indicating that object i will be observed. When M > 1, we need to expand the basis of fundamental object-to-sensor assignment matrices. A general way to handle this situation is by introducing dummy sensor and dummy object. With dummy sensors that have infinite noise power spectrum density, we can make ˘N an N N doubly sub-stochastic matrix where N M additional columns of zeros are added. Using Birkhoff theorem, we may decompose ˘N as a convex combination of permutation matrices [3]. Thus we have the feasible sensor-to-object assignment decomposition. In fact, there exists efficient algorithm that finds the weights fwk g in O.N 4:5 / for K D O.N 2 / coefficients [8]. t u Now we can design a sensor scheduling policy that periodically switches among the sensor-to-object assignment matrices fPk g to approximate the optimal solution to (23). Let ı be some duration of time. At time t D 0, the sensor-to-object assignment is based on P1 , i.e., we allow sensor j to observe object i only when p1;i;j D 1. Once the observations are made, each object will update its state estimate according to the Kalman–Bucy filter. At time t D w1 ı, we switch the sensor schedule according to P2 . At time t D .w1 C w2 /ı, we switch the sensor schedule according to P3 and so on. Note that the sensor schedule will go back to P1 after a period of ı. Theorem 3. Let Cı be the average cost associated with the periodic switching policy ı among the sensor-to-object assignment matrices fPk g. Then Cı Cl D o.ı/ as ı ! 0. Proof. Denote by ˙iı .t/ the estimation error covariance of object i under the periodic sensor scheduling policy ı . When the whole state estimator reaches to its steady state as t ! 1, ˙iı .t/ will converge to a periodic function ˙N iı .t/ with period ı. The matrix ˙N iı .t/ satisfies the periodic Riccati equation P ˙Niı D Ai ˙Niı C A0i ˙Niı C Wi ˙Niı .Hiı /0 Hiı ˙Niı

(49)

with initial condition ˙Niı .0/ D ˙i .0/ where Hiı D

M X j D1

1=2

Vij;ı Hij;ı

(50)

186

H. Chen et al.

is a piecewise constant value function with period ı [7]. Let ˙N iı be the average of ˙N iı .t/ Z 1 ı Nı ı N ˙ ./d (51) ˙i D ı 0 i and we can see that ˙N iı .t/ ˙N iı D o.ı/, 8t. As ı ! 0, ˙N iı converges to the unique solution to the algebraic Riccati equation [1] 0 Ai ˙N i C ˙N i A0i C Wi ˙N i @

M X

1 N ij Hij0 Vij1 Hij A ˙N i D 0;

(52)

j D1

since 1 lim T !1 T

Z

T 0

M N X X

ij ijı .t/dt

i D1 j D1

D

M N X X

ij N ij :

(53)

i D1 j D1

When N ij ’s are obtained by solving the semidefinite program (27), QN i D ˙N i1 also P 1 minimizes N i D1 Tr.Ci Qi / for all matrices Qi > 0 that satisfy Qi Ai C A0i Qi C Qi Wi Qi

M X

N ij Hij0 Vij1 Hij 0:

(54)

j D1

Thus the policy ı has the resulting fN ij ; QN i g with the average cost no greater than Cl C o.ı/ as ı ! 0. t u In summary, the optimal average cost C 2 ŒCl ; Cl C o.ı/. Unfortunately, the M sensors have to switch among K different sensor-to-object assignment solutions with appropriate coverage intervals within a short period ı in order to approach the lower bound Cl . The analysis is based on linear dynamic state and measurement equation for each object. We will have to extend the results to the nonlinear estimation case.

3.3 Nonlinear Filter Design and Performance Bound 3.3.1 Recursive Linear Minimum Mean Square Error Filter When a space object has been detected, a tracking filter will predict the object’s state at any time in the future based on the available sensor measurements. Both the state dynamics and measurement equation are nonlinear resulting in the nonlinear state estimator for each object. Despite the abundant literature on nonlinear filter design [6, 11, 12, 14, 19, 25], we chose the following tracking filter

Sensor Scheduling for Space Object Tracking and Collision Alert

187

based on our earlier study [9]. With any given sensor schedule policy, we use the following notations for state estimation of any nonlinear dynamic system. Let x D Œx y z xP yP zP0 be the position and velocity of a space object in the earth-center earth-fixed coordinate system. Denote by xO k the state prediction from time tk1 to time tk based on the state estimate xO C at time tk1 with all measurements up to k1 tk1 . The prediction is made by numerically integrating the state equation given by xPO .t/ D f .Ox.t/; u.t//

(55)

without the process noise. The mean square error (MSE) of the state prediction is obtained by numerically integrating the following matrix equation: T x PP .t/ D F .Ox k /P .t/ C P .t/F .O k / C W .t/;

(56)

where F .Ox k / is the Jacobian matrix of the Keplerian orbital dynamics given by

I3 ; 033

033 F .x/ D F0 .x/ 2 6 F0 .x/ D 4

3x 2 r13 r5 3xy r5 3xz r5

3xy r5

3y 2 r5

3yz r5

1 r3

p r D x 2 C y 2 C z2

and evaluated at x D

xO k.

3z2 r5

(57) 3xz r5 3yz r5

3 7 5;

(58)

1 r3

(59)

The sensor measurement zk obtained at time tk is given by zk D h.xk / C vk ;

(60)

vk N .0; Vk /

(61)

where is the measurement noise, which is assumed independent of each other and independent to the initial state as well as process noise. Let Zk be the cumulative sensor measurements up to tk from a fixed sensor scheduling policy. The recursive linear minimum mean square error (LMMSE) filter applies the following update equation [1]: xO kjk D E xk jZk D xO kjk1 C Kk zQ kjk1 ; 0

Pkjk D Pkjk1 Kk Sk Kk ; where xO kjk1 D E xk jZk1 ; zO kjk1 D E zk jZk1 ;

(62) (63)

188

H. Chen et al.

xQ kjk1 D xk xO kjk1 ; zQ kjk1 D zk zO kjk1 ; i h Pkjk1 D E xQ kjk1 xQ 0kjk1 ; i h Sk D E zQ kjk1 zQ 0kjk1 ; Kk D CxQk zQk Sk1 ; i h CxQk Qzk D E xQ kjk1 zQ 0kjk1 : Note that E Œ becomes the conditional mean of the state for linear Gaussian dynamics and the above filtering equations become the celebrated Kalman filter [1]. For nonlinear dynamic system, (62) is optimal in the mean square error sense when the state estimate is constrained to be an affine function of the measurement. Given the state estimate xO k1jk1 and its error covariance Pk1jk1 at time tk1 , if the state prediction xO kjk1 , the corresponding error covariance Pkjk1 , the measurement prediction zO kjk1 , the corresponding error covariance Sk , and the crosscovariance E xQ kjk1 zQ 0kjk1 in (62) and (63) can be expressed as a function only through xO k1jk1 and Pk1jk1 , then the above formula is truly recursive. However, for general nonlinear system dynamics (1) and measurement equation (60) , we have xO kjk1 D E

Z

tk tk1

f .x.t/; w.t//dt C xk1 jZk1 ;

zO kjk1 D E h.xk ; vk /jZk1 :

(64) (65)

Both xO kjk1 and zO kjk1 will depend on the measurement history Zk1 and the corresponding moments in the LMMSE formula. In order to have a truly recursive filter, the required terms at time tk can be obtained approximately through xO k1jk1 and Pk1jk1 , i.e., ˚ xO kjk1 ; Pkjk1 Pred f ./; xO k1jk1 ; Pk1jk1 ; ˚ zO kjk1 ; Sk ; CxQk Qzk Pred h./; xO kjk1 ; Pkjk1 ; ˚ where Pred f ./; xO k1jk1 ; Pk1jk1 denotes that xO k1jk1 ; Pk1jk1 propagates through the nonlinear function f ./ to approximate E f ./jZk1 and the corresponding error covariance Pkjk1 . Similarly, Pred h./; xO kjk1 ; Pkjk1 predicts the measurement and the corresponding error covariance only through the approximated state prediction. This poses difficulties for the implementation of the recursive LMMSE filter due to insufficient information. The prediction of a random variable going through a nonlinear function, most often, cannot be completely determined using only the

Sensor Scheduling for Space Object Tracking and Collision Alert

189

first and second moments. Two remedies are often used: One is to approximate the system via unscented transform such that the the approximated ˚ prediction based on system can be carried out only through xO k1jk1 ; Pk1jk1 [20, 21]. Another is by approximating the density function with a set of particles and propagating those particles in the recursive Bayesian filtering framework, i.e., using a particle filter [13, 15, 17].

3.3.2 Posterior Cramer–Rao Lower Bound of the State Estimation Error When computing the dynamics of the state estimation error covariance, the sensor scheduler can use the performance bound without requiring to optimize the sensor-to-object assignment with respect to a particularly designed nonlinear state estimator. Denote by J.t/ the Fisher information matrix. Then the posterior Cramer–Rao lower bound (PCRLB) is given by [32] B.t/ D J.t/1 ;

(66)

which quantifies the ideal mean square error of any filtering algorithm, i.e., E .Ox.tk / x.tk //.Ox.tk / x.tk //T jZk B.tk /:

(67)

Assuming an additive white Gaussian process noise model, the Fisher information matrix satisfies the following differential equation: JP .t/ D J.t/F .x/ F .x/T J.t/ J.t/Q.t/J.t/

(68)

for tk1 t tk where F is the Jacobian matrix given by F .x/ D

@f .x/ : @x

(69)

When a measurement is obtained at time tk with additive Gaussian noise N .0; Rk /, the new Fisher information matrix is J.tkC / D J.tk / C Ex H.x/T Rk1 H.x/ ;

(70)

where H is the Jacobian matrix given by H.x/ D

@h.x/ : @x

(71)

The initial condition for the recursion is J.t0 / and the PCRLB can be obtained with respect to the true distribution of the state x.t/.

190

H. Chen et al.

In practice, the recursive LMMSE filter will be used to track each space object. The sensor manager will use the estimated state to compute the PCRLB and solve the semidefinite program (27) by replacing Qi with the Fisher information matrix of object i . The resulting periodic switching policy will have to be updated at the highest sensor revisit rate in order to approach the performance lower bound of the average cost. Alternatively, the sensor manager can apply information gain-based policy or index-based policy which require less computation within a fixed horizon. See [10] for specific sensor management implementations that utilize PCRLB for orbital object tracking.

4 Simulation Study 4.1 Scenario Description We consider a small-scale space object tracking and collision alert scenario where 30 LEO observers collaboratively track 3 LEO satellites (called red team) and monitor 5 LEO asset satellites (called blue team). The orbital trajectories are created with the same altitude similar to those real satellites from the NORAD catalog, but we can change the orbital trajectories to generate a collision event between an object from the red team and an object from the blue team. The associated tracking errors for each object in the red team were obtained based on the recursive linear minimum mean square error filter when sensors are assigned to objects according to some criterion based on the non-maneuvering motion. We assume that the orbital trajectories of LEO observers and blue team are known to red team. We also assume that each observer can update the sensing schedule no sooner than 50 s. The sensor schedule is based on the weights being proportional to the estimated collision probability over the impact time. The estimation of collision probability and impact time was presented in [26]. Red team may direct an unannounced object to perform intelligent maneuver that changes the inclination of its orbit. In particular, at time t D 1,000 s, object 1 performs a 1 s burn that produces a specific thrust which leads to a collision to object 3 in the blue team in 785 s. At time t D 1,523 s, object 2 performs a 1 s burn that produces a specific thrust which leads to a collision event to object 5 in the blue team in 524 s. Note that the maneuver onset time of object 2 is chosen to have the Earth blockage of the closest 3 LEO observers for more than 200 s. The maneuver is also lethal because of the collision path to the closest asset satellite in less than 9 min. Within 1,000 s and 2,000 s, object 3 performs a 1 s burn with random maneuver onset time that does not lead to a collision. The goal of sensor selection is to improve the tracking accuracy and declare the collision event as early as possible with false alarm below a desirable rate. Each observer has range, bearing, elevation, and range rate measurements with standard deviations 100 m, 10 mrad, 10 mrad, and 2 m/s, respectively. We applied the generalized Page’s test (GPT) for maneuver

Sensor Scheduling for Space Object Tracking and Collision Alert Table 1 Comparison of tracking accuracy and maneuver detection delay

Object (i) Average delay (s) (i) Average peak position error (km) (i) Average peak velocity error (km/s) (ii) Average delay (s) (ii) Average peak position error (km) (ii) Average peak velocity error (km/s) (iii) Average delay (s) (iii) Average peak position error (km) (iii) Average peak velocity error (km/s)

191

1 126 23.4 0.29 133 24.3 0.30 154 26.1 0.32

2 438 53.3 0.38 149 26.7 0.33 177 28.4 0.35

3 83 13.6 0.21 92 14.8 0.23 101 16.3 0.26

onset detection while the filter update of the state estimate does not use the range rate measurement [29]. The reason is that the nonlinear filter designed assuming non-maneuver target motion is sensitive to the model mismatch in the range rate when a space object maneuvers. The thresholds of the GPT were chosen to have the false alarm probability PFA D 1%.

4.2 Performance Comparison We studied three different sensor management (SM) configurations. (i) Information-based method: Sensors are selected with a uniform sampling interval of 50 s to maximize the total information gain. (ii) Periodic switching method: Sensing actions are scheduled to minimize the average cost by solving the semidefinite program (27). (iii) Greedy method: Sensing actions are obtained using Whittle’s index obtained assuming identical sensors. We ran 200 Monte Carlo simulations on the tracking and collision alert scenario for each SM configuration and compare both tracking and collision alert performance as opposed to the criteria used in the SM schemes. Table 1 shows the peak errors in position and velocity for each object in red team based on the centralized tracker using the measurements from three different SM schemes. The average detection delays for each object are also shown in Table 1. We can see that both the maneuver detection delay and average peak estimation error are larger using the conventional SM scheme (i) than the ones that optimize the cost over infinite horizon—(ii) and (iii)—for object 2. Note that object 2 has a lethal maneuver that requires more prompt sensing action to make early declaration of the collision event. However, the immediate information gain may not be as large as that from object 1. The covariance control based method will not make any correction to the sensing schedule either before the maneuver detection of object 2, which is a consequence of planning over a short time horizon. Interestingly, the performance degradation is quite mild for the index-based SM scheme compared with its near-optimal counterpart. Next, we compare the collision detection performance as well as the average time between the collision alert and its occurrence. We also compute the average number

192

H. Chen et al. Table 2 Performance comparison of collision detection probability and average early-warning duration Detection False alarm Average Configuration probability probability duration (s) Average scans (i) Object 1 (i) Object 2 (ii) Object 1 (ii) Object 2 (iii) Object 1 (iii) Object 2

0.88 0.31 0.93 0.85 0.88 0.78

0.04 0.05 0.04 0.03 0.04 0.04

514 138 518 346 502 328

2.8 2.5 2.6 2.2 2.5 2.4

of scans required to declare a collision event starting from the maneuver onset time. A collision alert will be declared when the closest encounter of two space objects is within 10 km with at least 99% probability based on the predicted orbital states. The false alarm probability is estimated from the collision declaration occurrence between object 3 and any of the asset satellites. The performance of collision alert with three SM schemes is shown in Table 2. We can see that the information gainbased method (configuration (i)) yields much smaller collision detection probability for object 2. Among those collision declarations for object 2, the average duration between the collision alert and the actual encounter time is much shorter using configuration (i) than using configurations (ii) and (iii). Thus blue team will have limited response time in choosing the appropriate collision avoidance action. This is mainly due to the long delay of detecting maneuvering object thus leading to large tracking error as seen in Table 1. In contrast, periodic switching method (configuration (ii)) achieves much more accurate collision detection with longer early warning time on average. It is worth noting that the index-based method (configuration (iii)) yields slightly worse performance than that of configuration (ii) due to its greedy manner in solving the non-indexable RBP. Nevertheless, configuration (iii) is computationally more efficient and yields satisfactory performance compared with the near-optimal policy (ii).

5 Summary and Conclusions We studied the sensor scheduling problem where N space objects are monitored by M sensors whose task is to provide the minimum mean square estimation error of the overall system subject to the cost associated with each measurement. We first formulated the sensor scheduling problem using the optimal control formalism and then derive a tractable relaxation of the original optimization problem, which provides a lower bound on the achievable performance. We proposed an open-loop periodic switching policy whose performance is arbitrarily close to the theoretical lower bound. We also discussed a special case of identical sensors and derive an index policy that coincides with the general solution to restless multi-armed bandit

Sensor Scheduling for Space Object Tracking and Collision Alert

193

problem by Whittle. Finally, we demonstrated the effectiveness of the resulting sensor management scheme for space situational awareness using a realistic space object tracking scenario with both unintentional and intentional maneuvers by RSOs that may lead to collision. Our sensor scheduling scheme outperforms the conventional information gain and covariance control based schemes in the overall tracking accuracy as well as making earlier declaration of collision events. The index policy has a slight performance degradation than the near-optimal periodic switching policy with reduced computational cost, which seems to be applicable to large-scale problems. Acknowledgment H. Chen was supported in part by ARO through grant W911NF- 08-1-0409, ONR-DEPSCoR through grant N00014-09-1-1169 and Office of Research & Sponsored Programs at University of New Orleans. The authors are grateful to the anonymous reviewers for their constructive comments to an earlier draft of this work.

References 1. Bar-Shalom, Y., Li, X.R., Kirubarajan, T.: Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software. Wiley, New York (2001) 2. Bertsekas, D.: Dynamic Programming and Optimal Control (2nd edn.). Athena Scientific, Belmont (2001) 3. Birkhoff, G.: Tres observaciones sobre el algebra lineal. Univ. Nac. Tucuman Rev. 5, 147–151 (1946) 4. Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, New York (2004) 5. Boyko, N., Turko, T., Boginski, V., Jeffcoat, D.E., Uryasev, S., Zrazhevsky, G., Pardalos, P.M.: Robust multi-sensor scheduling for multi-site surveillance. J. Comb. Optim. 22(1), 35–51 (2011) 6. Carme, S., Pham, D.-T., Verron, J.: Improving the singular evolutive extended Kalman filter for strongly nonlinear models for use in ocean data assimilation. Inverse Probl. 17, 1535–1559 (2001) 7. Carpanese, N.: Periodic Riccati difference equation: approaching equilibria by implicit systems. IEEE Trans. Autom. Contr. 45(7), 1391–1396 (2000) 8. Chang, C., Chen, W., Huang, H.: Birkhoff-von Neumann input buffered crossbar switches. In: Proc. IEEE INFORCOM. 3, 1614–1623 (2000) 9. Chen, H., Chen, G., Blasch, E.P., Pham, K.: Comparison of several space target tracking filters. In: Proceedings of SPIE Defense, Security Sensing, vol. 7730, Orlando (2009) 10. Chen, H., Chen, G., Shen, D., Blasch, E.P., Pham, K.: Orbital evasive target tracking and sensor management. In: Dynamics of Information Systems: Theory and Applications. Hirsch, M.J., Pardalos, P.M., Murphey, R. (eds.), Lecture Notes in Control and Information Sciences. Springer, New York (2010) 11. Daum, F.E.: Exact finite-dimensional nonlinear filters. IEEE Trans. Autom. Contr. 31, 616–622 (1986) 12. Daum, F.E.: Nonlinear filters: beyond the Kalman filter. IEEE Aerosp. Electron. Syst. Mag. 20, 57–69 (2005) 13. Doucet, A., de Frietas, N., Gordon, N. (eds.): Sequential Monte Carlo Methods in Practice. Statistics for Engineering and Information Science. Springer, New York (2001) 14. Evensen, G.: Data Assimilation: The Ensemble Kalman Filter. Springer, New York (2006)

194

H. Chen et al.

15. Gilks, W.R., Berzuini, C.: Following a moving target—Monte Carlo inference for dynamic Bayesian models. J. R. Stat. Soc. B 63, 127–146 (2001) 16. Gittins, J.C., Jones, D.M.: A dynamic allocation index for the sequential design of experiments. In: Progress in Statistics (European Meeting of Statisticians) (1972) 17. Gordon, N., Salmond, D., Smith, A.F.: Novel approach to nonlinear/non-Gaussian Bayesian state estimation. IEE Proc. F 140(2), 107–113 (1993) 18. Guha, S., Munagala, K.: Approximation algorithms for budgeted learning problems. In: Proceedings ACM Symposium on Theory of Computing (2007) 19. Houtekamer, P.L., Mitchell, H.L.: Data assimilation using an ensemble Kalman filter technique. Monthly Weather Rev. 126, 796–811 (1998) 20. Julier, S., Uhlmann, J., Durrant-Whyte, H.F.: A new method for the nonlinear transformation of means and covariances in filters and estimators. IEEE Trans. Autom. Contr. 45, 477–482 (2000) 21. Julier, S., Uhlmann, J.: Unscented filtering and nonlinear estimation. Proc. IEEE 92(3), 401–422 (2004) 22. Kalandros, M., Pao, L.Y.: Covariance control for multisensor systems. IEEE Trans. Aerosp. Electron. Syst. 38, 1138–1157 (2002) 23. Kreucher, C.M., Hero, A.O., Kastella, K.D., Morelande, M.R.: An information based approach to sensor management in large dynamic networks. Proc. IEEE 95, 978–999 (2007) 24. Lemaitre, M., Verfaille, G., Jouhaud, F., Lachiver, J.M., Bataille N.: Selecting and scheduling observations of agile satellites. Aerosp. Sci. Technol. 6, 367–381 (2002) 25. Li, X.R., Jilkov, V.P.: A survey of maneuvering target tracking: approximation techniques for nonlinear filtering. In: Proceedings of SPIE Conference on Signal and Data Processing of Small Targets, vol. 5428–62, Orlando (2004) 26. Maus, A., Chen, H., Oduwole, A., Charalampidis, D.: Designing collision alert system for space situational awareness. In: 20th ANNIE Conference, St. Louis, MO (2010) 27. Nino-Mora, J.: Restless bandits, partial conservation laws and indexability. Adv. Appl. Prob. 33, 76–98 (2001) 28. Papadimitriou, C., Tsitsiklis, J.: The complexity of optimal queueing network control. Math. Oper. Res. 2, 293–305 (1999) 29. Ru, J., Chen, H., Li, X.R., Chen, G.: A range rate based detection technique for tracking a maneuvering target. In: Proceedings of SPIE Conference on Signal and Data Processing of Small Targets (2005) 30. Sage, A., Melsa, J.: Estimation Theory with Applications to Communications and Control. McGraw-Hill, USA (1971) 31. Sorokin, A., Boyko, N., Boginski, V., Uryasev, S., Pardalos, P.M.: Mathematical programming tehcniques for sensor networks. Algorithms 2, 565–581 (2009) 32. Van Trees, H.L.: Detection, Estimation, and Modulation Theory, Part I. Wiley, New York (1968) 33. Whittle, P.: Restless bandits: Activity allocation in a changing world. J. Appl. Probab. 25, 287–298 (1988)

Throughput Maximization in CSMA Networks with Collisions and Hidden Terminals Sankrith Subramanian, Eduardo L. Pasiliao, John M. Shea, Jess W. Curtis, and Warren E. Dixon

Abstract The throughput at the medium-access control (MAC) layer in a wireless network that uses the carrier-sense multiple-access (CSMA) protocol is degraded by collisions caused by failures of the carrier-sensing mechanism. Two sources of failure in the carrier-sensing mechanism are delays in the carrier-sensing mechanism and hidden terminals, in which an ongoing transmission cannot be detected at a terminal that wishes to transmit because the path loss from the active transmitter is large. In this chapter, the effect of these carrier-sensing failures is modeled using a continuous-time Markov model. The throughput of the network is determined using the stationary distribution of the Markov model. The throughput is maximized by finding optimal mean transmission rates for the terminals in the network subject to constraints on successfully transmitting packets at a rate that is at least as great as the packet arrival rate.

Keywords Medium access control • Carrier-sense multiple access • CSMA Markov chain • Throughput • Convex optimization

S. Subramanian () • J.M. Shea • W.E. Dixon Department of Electrical and Computer Engineering, University of Florida, Gainesville FL 32611, USA e-mail: [email protected]; [email protected]; [email protected] E.L. Pasiliao • J.W. Curtis Munitions Directorate, Air Force Research Laboratory, Eglin AFB, FL 32542, USA e-mail: [email protected]; [email protected] 195 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 10, © Springer Science+Business Media New York 2012

196

S. Subramanian et al.

1 Introduction Quality of servise (QoS) management and throughput maximization are important capabilities for tactical and mission-critical wireless networks. In the last few years, most research efforts in this area have focused on the optimization and control of specific layers in the communications stack. Examples include specialized QoSenabled middleware, as well as protocols and algorithms at the transport, network, data link and physical layers. In this work, an analytical framework that allows optimization of the MAC protocol transmission rates in the presence of collisions is developed that will enable further work on cross-layer design involving the MAC layer. MAC layer throughput optimization focuses on manipulating specific parameters of the MAC layer, including window sizes and transmission rates to maximize/optimize the throughput in the presence of constraints. MAC protocols have been the focus of wireless networks research for the last several years. For example, the use of Markov chains was introduced in [5, 14] to analyze the performance of carrier-sense multiple access (CSMA) MAC algorithms. Performance and throughput analysis of the conventional binary exponential backoff algorithms have been investigated in [3, 4]. In most cases, previous MAC-level optimization algorithms have focused primarily on parameters and feedback from the MAC layer by excluding collisions during the analysis (cf. [5, 10]). In this chapter, we introduce and discuss an approach to include collisions in mobile ad hoc networks for MAC optimization. Preliminary work on CSMA throughput modeling and analysis was done in [5] based on the assumption that the propagation delay between neighboring nodes is zero. A continuous Markov model was developed to provide the framework and motivation for developing an algorithm that maximizes throughput in the presence of propagation delay. In [10], a collision-free model is used to quantify and optimize the throughput of the network. The feasibility of the arrival rate vector guarantees the reachability of maximum throughput, which in turn satisfies the constraint that the service rate is greater than or equal to the arrival rate, assuming that the propagation delay is zero. In general, the effects of propagation delay play a crucial role on the behavior and throughput of a communication network. Recent efforts attempted various strategies to include delay models in the throughput model. For example, in [13], delay is introduced, and is used to analyze and characterize the achievable rate region for static CSMA schedulers. Collisions, and hence delays, are incorporated in [9] in the Markov model. The mean transmission length of the packets is used as the control variable to maximize the throughput. In this chapter, a model for propagation delay is proposed and incorporated in the model for throughput, and the latter is optimized by first formulating an unconstrained problem and then a constrained problem in the presence of practical rate constraints in the network. Instead of mean transmission lengths (cf. [9]), these formulations are solved using an appropriate numerical optimization technique to obtain the optimal mean transmission rates.

Throughput Maximization in CSMA Networks

197

This chapter introduces a throughput model based on [10]. A continuous-time CSMA Markov chain is used to capture the MAC layer dynamics, and the collisions in the network are modeled based on the influence of adjacent links. The waiting times are independently and exponentially distributed. Collisions due to hidden terminals in the network are also modeled and analyzed. Link throughput is optimized by optimizing the waiting times in the network.

2 Network Model Consider an .n C k/-link network with n C k C 1 nodes as shown in Fig. 1, where network A consists of n links and network B consists of k links. Assume that all nodes can sense all other nodes in the network. However, there is a sensing delay, so that if two nodes initiate packet transmission within a time duration of ıTs , there

Fig. 1 An (n C k/-link network scenario and conflict graph

198

S. Subramanian et al.

will be a collision. Let .n C k/ denote the total number of links in the network. In a typical CSMA network, the transmitter of node m backs off for a random period before it sends a packet to its destination node, if the channel is idle. If the channel is busy, the transmitter freezes its backoff counter until the channel is idle again. This backoff time, or the waiting time, for each link m is exponentially distributed with mean 1=Rm . The objective in this chapter is to determine the optimal values of the mean transmission rates Rm , m D 1; 2; : : : ; n C k, so that the throughput in the network is maximized. For this purpose, a Markovian model is used with states defined as x i W A ! f0; 1gnCk , where i 2 A represents the status of the network, which takes the value of 1 for an active link and 0 represents an idle link. i For example, if the mth link in state i is active, then xm D 1. Previous work assumes that the propagation delay between neighboring nodes is zero (cf. [5, 10]). Since propagation delays enable the potential for collisions, there exists motivation to maximize the throughput in the network in the presence of these delays. Additionally, collisions due to hidden terminals are possible, and this chapter captures the effect of hidden terminals in the CSMA Markov chain described in the following section.

3 CSMA Markov Chain Formulations of Markov models for capturing the MAC layer dynamics in CSMA networks were developed in [5, 14]. The stationary distribution of the states and the balance equations were developed and used to quantify the throughput. Recently, a continuous-time CSMA Markov model without collisions was used in [10] to develop an adaptive CSMA to maximize throughput. Collisions were introduced in [9] in the Markov model, and the mean transmission length of the packets is used as the control variable to maximize the throughput. Since most applications experience random length of packets, the transmission rates (packets/unit time), Rm , m D 1; 2; : : : ; n; provide a practical measure. The model for waiting times is based on the CSMA random access protocol. The probability density function of the waiting time Tm is given by ( Rm exp.Rm tm /; tm 0; fTm .tm / D 0; tm < 0: Due to the sensing delay experienced by the network nodes, the probability that link m becomes active within a time duration of ıTs from the instant link l becomes active is pcm , 1 exp .Rm ıTs /

(1)

by the memoryless property of the exponential random variable. Thus, the rate of transition Gi to one of the non-collision states in the Markov chain in Fig. 2 is defined as

Throughput Maximization in CSMA Networks

199

Fig. 2 CSMA Markov chain with collision states for a 3-link network scenario with hidden terminals

Gi D

n X

0 @xui Ru

Y

1 pcl

1 .1xli / A

:

(2)

l¤u

uD1

The rate of transition Gi to one of the collision states is given by Gi D

n X uD1

0 @xui Ru

Y

1 xli .1xli / A: pcl 1 pcl

(3)

l¤u

For example, the state .1; 1; 0/ in Fig. 2 represents the collision state (for network A), which occurs when a link tries to transmit within a time span of ıTs from the instant another link starts transmitting. The primary objective of modeling the network as a continuous CSMA Markov chain is that the probability of collision-free transmission needs to be maximized. For this purpose, the rate ri is defined as

200

S. Subramanian et al.

!9 8 8 n i ˆ P Q ˆ > 1x . / ˆ ˆ > l ˆ ˆ > xi R 1 pcl ˆ ˆ > ˆ < uD1 u u l¤u = ˆ ˆ ˆ ˆ log ; i 2 AT ˆ n P i ˆ ˆ > ˆ ˆ > ˆ ˆ > x u ˆ ˆ > u ˆ : ; ˆ uD1 ˆ ˆ ! < n .1xli / P Q xli ri , i pcl 1 pcl xu Ru ˆ ˆ ˆ uD1 l¤u ˆ ˆ ; i 2 AC ˆ ˆ min .m / ˆ ˆ i ˆ mWxm ¤0 ˆ ˆ ˆ ˆ ˆ ˆ ˆ ˆ : 1; i 2 AI ;

(4)

so that the stationary distribution of the continuous-time Markov chain can be defined as exp .ri / ; p .i / , P (5) exp rj j

where, in (4), 1=m is the mean transmission length of the packets if the network c is in one of the states in set AT in sensing region A. The set AT , AC n .0; 0/T represents the set of all collision-free transmission states, where the elements in the set AC represent the collision states, and the elements in the set AcC represent the non-collision states. The set AI represents the inactive state, i.e., x i D .0; 0; 0/. In (4), the definitions for the rate of transitions in (2) and (3) are used, and (5) satisfies the detailed balance equation (cf. [11]). In addition, if there are hidden terminals (HT) in the network as shown in Fig. 2, then ri can be defined for the sensing region B in a similar way as defined for sensing region A in (4). Let sets BT , BC , and BI represent the collision-free transmission states, collision states, and the inactive states, respectively. Based on the transmission, collision, and idle states of the links in the sensing regions A and B, i belongs to one of the combinations of the sets AT , AC , AI , BT , BC , and BI . Therefore (cf. [5]), 8 ˆ FA FB ; i 2 AT [ BT ˆ ˆ ˆ ˆ ˆ GA FB ; i 2 AC [ BT ˆ ˆ ˆ ˆ ˆ ˆ FB ; i 2 AI [ BT ˆ ˆ ˆ ˆ ˆ ˆ < FA GB ; i 2 AT [ BC ri , GA GB ; i 2 AC [ BC ˆ ˆ ˆ ˆ GB ; i 2 AI [ BC ˆ ˆ ˆ ˆ ˆ ˆ FA ; i 2 AT [ BI ˆ ˆ ˆ ˆ ˆ GA ; i 2 AC [ BI ˆ ˆ ˆ : 1; i 2 AI [ BI ;

Throughput Maximization in CSMA Networks

where FA , log

!9 8 n i P Q ˆ > 1x . / ˆ > l ˆ > 1 pcl xi R ˆ > < uD1 u u l¤u = n P

ˆ ˆ ˆ ˆ :

n P uD1

GA ,

201

> > > > ;

xui u

uD1

xui Ru

.1xli / Q xli pcl 1 pcl

;

!

l¤k

:

min .m /

i ¤0 mWxm

FB and GB can be defined similarly for network B in Fig. 1.

4 Throughput Maximization To quantify the throughput, a log-likelihood function is defined as the summation over all the collision-free transmission states as X log .p .i // : (6) F .R/ , i 2.AT [BI /[.AI [BT /

By using the definition for p .i / in (5), the log-likelihood function can be rewritten as F .R/ D

n X

log

uD1

C

kCn X

Ru u

.n 1/

n X

Ru ıTs

uD1

log

vD1C1

Rv v

" .n C k/ log

.k 1/

kCn X

Rv ıTs

vDnC1

X

i 2AT [BT

C

X

exp .FA FB / C X

exp .FB / C

i 2AI [BT

C

X

C

i 2AT [BI

X

exp .FA GB /

i 2AT [BC

X

exp .GA GB / C

i 2AC [BC

X

exp .GA FB /

i 2AC [BT

exp .GB /

i 2AI [BC

exp .FA / C

X i 2AC [BI

exp .GA / C

X

# exp .1/ :

(7)

i 2AI [BI

The function F .R/ is convex (cf. [6]), and F .R/ 0 since log p x i 0. The optimization problem is defined as

202

S. Subramanian et al.

min .F .R// :

(8)

R

In addition to maximizing the log-likelihood function, certain constraints must be satisfied. The service rate S .R/ at each transmitter of a link needs to be equal to the arrival rate , and the chosen mean transmission rates Rk , k D 1; 2; : : : ; n; need to be nonnegative. Thus, the optimization problem can be formulated as min .F .R// R

subject to log log S .R/ D 0;

(9)

R 0;

(10)

and where R 2 Rn ; S .R/ 2 Rn1 ; and 2 Rn1 . The service rate for a link is the rate at which a packet is transmitted, and is quantified for sensing region A as Rk

exp log Sm .R/ ,

P j

Q l¤m

exp.Rl ıTs /

!!

m

exp rj

;

m D 1; 2; : : : ; n 1; and the denominator is defined in (4). Service rates for sensing region B can be defined similarly. Note that log m log Sm .R/ D 0; and m > 0 is convex for all m. The optimization problem defined above is a convex-constrained nonlinear programming problem, and obtaining an analytical solution is difficult. There are numerical techniques adopted in the literature which have investigated such problems in detail [1, 2, 6, 12]. As detailed in Sect. 5, a suitable numerical optimization algorithm is employed to solve the optimization problem defined in (8)–(10).

5 Simulation Results The constrained convex nonlinear programming problem defined in (8)–(10) is solved by optimizing the mean transmission rates Rm , m D 1; 2; : : : ; n C k; of the transmitting nodes in the network of Fig. 1. A MATLAB built-in function fmincon is used to solve the optimization problem by configuring it to use the interior point algorithm (cf. [7, 8]). Once the mean transmission rates are optimized, they are fixed in a simulation (developed in MATLAB) that uses the CSMA MAC protocol. The function fmincon solves the optimization problem only for a set of feasible arrival rates.

Throughput Maximization in CSMA Networks

203

Table 1 Optimal values of the mean transmission rates for a 3-link collision network with hidden terminals (refer to Fig. 2) for various values of sensing delays. The optimum values of the mean transmission rates are the solution to the constrained problem defined in (8)–(10) Max. Feasible Opt. Mean TX arrival rate rate Sensing delay 0:001 0:01 0:1

1 0:2 0:18 0:12

2 0:2 0:17 0:12

3 0:1 0:11 0:1

R1 3:94 3:78 2:56

R2 3:94 3:58 2:56

R3 1:96 2:23 1:65

Queue length evolution of the colliding nodes 1.4 Node 1 Node 2 Node 4

Queue length, in dataunits

1.2

1

0.8

0.6

0.4

0.2

0

0

1

2

3

4

5

6

7

Iterations Each iteration = 10 µsec (Slot Time)

8

9

10 x 104

Fig. 3 Queue lengths of nodes 1, 2, and 4 transmitting to the same node 3. The optimum values of the mean transmission rates are the solution to the constrained problem defined in (8)–(10). All nodes are in the sensing region, and ıTs D 0:01 ms, R1 D 3:78 dataunits/ms, R2 D 3:58 dataunits/ms, R3 D 2:23 dataunits/ms, 1 D 0:02 dataunits/ms, 2 D 0:05 dataunits/ms, 3 D 0:05 dataunits/ms

A slot time of 10 s is used, and the mean transmission lengths of the packets, 1=m , m D 1; 2; : : : ; n C k; are set to 1 ms. Further, a stable (and feasible) set of arrival rates, in the sense that the queue lengths at the transmitting nodes are stable, are chosen before the simulation.

204

S. Subramanian et al.

The collision network of Fig. 1 is simulated using the platform explained above. The optimal values of the mean transmission rates, R1 , R2 , and R3 , are obtained and tabulated as shown in Table 1 for different values of the sensing delay ıTs (note that in the scenario of Fig. 1, the sensing delay applies to the nodes in network A). The capacity of the channel is normalized to 1 dataunit/ms. The mean transmission lengths of the packets are 1=1 D 1=2 D 1=3 D 1 ms. A simulation of a CSMA system with collisions is implemented in MATLAB. Figure 3 shows the evolution of the queue lengths of nodes 1, 2, and 4 (refer to Fig. 1) for a sensing delay of ıTs D 0:01 ms. The optimal mean transmission rates (R1 D 3:78 dataunits/ms, R2 D 3:58 dataunits/ms, R3 D 2:23 dataunits/ms) are generated by fmincon, and the stable arrival rates of 1 D 0:05 dataunits/ms, 2 D 0:05 dataunits/ms, and 3 D 0:01 dataunits/ms are used.

6 Conclusion A model for collisions caused due to both sensing delays and hidden terminals is developed and incorporated in the continuous CSMA Markov chain. A constrained optimization problem is defined, and a numerical solution is suggested. Simulation results are provided to demonstrate the stability of the queues for a given stable set of arrival rates. Future efforts will focus on including queue length constraints in the optimization problem and developing online solutions to the combined collision minimization and throughput maximization problem. Acknowledgements This research is supported by a grant from AFRL Collaborative System Control STT.

References 1. Bazaraa, M.S., Sherali, H.D., Shetty, C.M.: Nonlinear Programming—Theory and Algorithms (2nd edn.). Wiley, Hoboken (1993) 2. Bertsekas, D.P.: Nonlinear Programming. Athena Scientific, Belmont (1999) 3. Bianchi, G.: IEEE 802.11—Saturation throughput analysis. IEEE Commun. Lett. 2(12), 318–320 (1998) 4. Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Select. Commun. 18(3), 535–547 (2000) 5. Boorstyn, R., Kershenbaum, A., Maglaris, B., Sahin, V.: Throughput analysis in multihop CSMA packet radio networks. IEEE Trans. Commun. 35(3), 267–274 (1987) 6. Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, New York (2004) 7. Byrd, R.H., Gilbert, J.C.: A trust region method based on interior point techniques for nonlinear programming. Math. Progr. 89, 149–185 (1996) 8. Byrd, R.H., Hribar, M.E., Jorge Nocedal, Z.: An interior point algorithm for large scale nonlinear programming. SIAM J. Optim. 9, 877–900 (1999)

Throughput Maximization in CSMA Networks

205

9. Jiang, L., Walrand, J.: Approaching throughput-optimality in distributed CSMA scheduling algorithms with collisions. IEEE/ACM Trans. Netw. 19(3), 816–829 (2011) 10. Jiang, L., Walrand, J.: A distributed CSMA algorithm for throughput and utility maximization in wireless networks. IEEE/ACM Trans. Netw. 18(3), 960–972 (2010) 11. Kelly, K.P.: Reversibility and Stochastic Networks. Wiley, Chichester (1979) 12. Luenberger, D.G.: Introduction to Linear and Nonlinear Programming. Addison-Wesley, Reading (1973) 13. Marbach, P., Eryilmaz, A., Ozdaglar, A.: Achievable rate region of CSMA schedulers in wireless networks with primary interference constraints. In: Proceedings of the IEEE Conference on Decision and Control, pp. 1156–1161 (2007) 14. Wang, X., Kar, K.: Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks. In: Proceedings of the IEEE Annual Joint Conference IEEE Computation and Communication Societies INFOCOM 2005, vol. 1, pp. 23–34 (2005)

Optimal Formation Switching with Collision Avoidance and Allowing Variable Agent Velocities Dalila B.M.M. Fontes, Fernando A.C.C. Fontes, and Am´elia C.D. Caldeira

Abstract We address the problem of dynamically switching the geometry of a formation of a number of undistinguishable agents. Given the current and the final desired geometries, there are several possible allocations between the initial and final positions of the agents as well as several combinations for each agent velocity. However, not all are of interest since collision avoidance is enforced. Collision avoidance is guaranteed through an appropriate choice of agent paths and agent velocities. Therefore, given the agent set of possible velocities and initial positions, we wish to find their final positions and traveling velocities such that agent trajectories are apart, by a specified value, at all times. Among all the possibilities we are interested in choosing the one that minimizes a predefined performance criteria, e.g. minimizes the maximum time required by all agents to reach the final geometry. We propose here a dynamic programming approach to solve optimally such problems. Keywords Autonomous agents • Optimization • Dynamic programming • Agent formations • Formation geometry • Formation switching • Collision avoidance

D.B.M.M. Fontes () Faculdade de Economia, Universidade do Porto, Rua Dr. Roberto Frias, 4200-464 Porto, Portugal e-mail: [email protected] F.A.C.C. Fontes Faculdade de Engenharia, Universidade do Porto, Rua Dr. Roberto Frias, 4200-465 Porto, Portugal e-mail: [email protected] A.C.D. Caldeira Departamento de Matem´atica, Instituto Superior de Engenharia do Porto, R. Dr. Ant´onio Bernardino de Almeida 431, 4200-072 Porto, Portugal e-mail: [email protected] 207 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 11, © Springer Science+Business Media New York 2012

208

D.B.M.M. Fontes et al.

1 Introduction In this paper, we study the problem of switching the geometry of a formation of undistinguishable agents by minimizing some performance criterion. The questions addressed are, given the initial positions and a set of final desirable positions, which agent should go to a specific final position, how to avoid collision between the agents, and which should be the traveling velocities of each agent between the initial and final positions. The performance criterion used in the example explored is to minimize the maximum traveling time, but the method developed— based on dynamic programming—is sufficiently general to accommodate many different criteria. Formations of undistinguishable agents arise frequently both in nature and in mobile robotics. The specific problem of switching the geometry of a formation arises in many cooperative agents missions, due to the need to adapt to environmental changes or to adapt to new tasks. An example of the first type is when a formation has to go through a narrow passage, or deviate from obstacles, and must reconfigure to a new geometry. Examples of adaptation to new tasks arise in robot soccer teams: when a team is in an attack formation and loses the ball, it should switch to a defence formation more appropriate to the new task. Another example arises in the detection and containment of a chemical spillage, the geometry of the formation for the initial task of surveillance, should change after detection occurs, switching to a formation more appropriate to determine the perimeter of the spill. Research in coordination and control of teams of several agents (that may be robots, ground, air, or underwater vehicles) has been growing fast in the past few years. Application areas include unmanned aerial vehicles (UAVs) [4, 18], autonomous underwater vehicles (AUVs) [16], automated highway systems (AHSs) [3, 17], and mobile robotics [20, 21]. While each of these application areas poses its own unique challenges, several common threads can be found. In most cases, the vehicles are coupled through the task they are trying to accomplish, but are otherwise dynamically decoupled, meaning the motion of one does not directly affect the others. For a survey in cooperative control of multiple vehicles systems, see, e.g., the work by Murray [11]. Regarding research on the optimal formation switching problem, it is not abundant, although it has been addressed by some authors. Desai et al. in [5], model mobile robots formation as a graph. The authors use the so-called “control graphs” to represent the possible solutions for formation switching. In this method, for a graph having n vertices there are nŠ.n 1/Š=2n1 control graphs, and switching can only happen between predefined formations. The authors do not address collision or velocity issues. Hu and Sastry [9] study the problems of optimal collision avoidance and optimal formation switching for multiple agents on a Riemannian manifold. However, no choice of agent traveling velocity is considered. It is assumed that the underlying manifold admits a group of isometries, with respect to which the Lagrangian function is invariant. A reduction method is used to derive optimality conditions for the solutions. In [19] Yamagishi describes a decentralized controller for the reactive formation switching of a team of autonomous mobile robots. The focus is on how a structured formation of agents can

Optimal Formation Switching

209

reorganize into a nonrigid formation based on changes in the environment. The controller utilizes nearest-neighbor artificial potentials (social rules) for collision-free formation maintenance and environmental changes act as a stimulus for switching between formations. A similar problem, where a set of agents must perform a fixed number of different tasks on a set of targets, has been addressed by several authors. The methods developed include exhaustive enumeration (see Rasmussen et al. [13]), branch-and-bound (see Rasmussen and Shima [12]), network models (see Schumacher et al. [14, 15]), and dynamic programming (see Jin et al. [10]). None of these works address velocity issues. A problem of formation switching has also been addressed in [6, 7] using dynamic programming. However, the possible use of different velocities for each agent was not addressed. But the possibility of slowing down some of the agents might, as we will show in an example, achieve better solutions while avoiding collision between agents. We propose a dynamic programming approach to solve the problem of formation switching with collision avoidance and agent velocities selection, that is, the problem of deciding which agent moves to which place in the next formation guaranteeing that at any time the distance between any two of them is at least some predefined value. In addition, each agent can also explore the possibility of modifying its velocity to avoid collision, which is a main distinguishing feature from previous work. The formation switching performance is given by the time required for all agents to reach their new position, which is given by the maximum traveling time amongst individual agent traveling times. Since we want to minimize the time required for all agents to reach their new position, we have to solve a minmax problem. However, the methodology we propose can be used with any separable performance function. The problem addressed here should be seen as a component of a framework for multiagent coordination, incorporating also the trajectory control component [8], which allows to maintain or change formation while following a specified path in order to perform cooperative tasks. This paper is organized as follows. In the next section, the problem of optimal reorganization of agent formations with collision avoidance is described and formally defined. In Sect. 3, a dynamic programming formulation of the problem is given and discussed. In Sect. 4, we discuss computational implementation issues of the dynamic programming algorithm, namely an efficient implementation of the main recursion as well as efficient data representations. A detailed description of the algorithms is also provided. Next, an example is reported to show the solution modifications when using velocities selection and collision avoidance. Some conclusions are drawn in the final section.

2 The Problem In our problem a team of N identical agents has to switch from their current formation to some other formation (i.e., agents have a specific goal configuration not related to the positions of the others), possibly unstructured, with collision avoidance. To address collision avoidance, we impose that the trajectories of the

210

D.B.M.M. Fontes et al.

agents must satisfy the separation constraint that at any time the distance between (the center of) any two of them is at least , for some positive . (So, should be at least the diameter of an agent.) The optimal (joint) trajectories are the ones that minimize the maximum trajectory time of individual agents. Our approach can be used either centralized or decentralized, depending on the agent capabilities. In the latter case, all the agents would have to run the algorithm, which outputs an optimal solution, always the same if many exist, since the proposed method is deterministic. Regarding the new formation, it can be either a pre-specified formation or a formation to be defined according to the information collected by the agents. In both cases, we do a preprocessing analysis that allows us to come up with the desired locations for the next formation. This problem can be restated as the problem of allocating to each new position exactly one of the agents, located in the old positions, and determine each agent velocity. From all the possible solutions we are only interested in the ones where agent collision is prevented. Among these, we want to find one that minimizes the time required for all agents to move to the target positions, that is, an allocation which has the least maximum individual agent traveling time. To formally define the problem, consider a set of N agents moving in a space Rd , so that at time t, agent i has position qi .t/ in Rd (we will refer to qi .t/ D .xi .t/; yi .t// when our space is the plane R2 ). The position of all agents is defined d N by the N-tuple Q.t/ D Œqi .t/N . We assume that each agent is holonomic i D1 in R and that we are able to choose its velocity, so that its kinematic model is a simple integrator qPi .t/ D #i .t/ a:e: t 2 RC : The initial positions at time t D 0 are known and given by A D Œai N i D1 D Q.0/. Suppose a set of M (with M N ) final positions in Rd is specified as F D ff1 ; f2 ; : : : ; fM g. The problem is to find an assignment between the N agents and N final positions in F . That is, we want to find an N-tuple B D Œbi N i D1 of different elements of F , such that at some time T > 0, Q.T / D B and all b i 2 F , with bi ¤ bk . There are M N N Š such N-tuples (the permutations of a set of N elements chosen from a set of M elements) and we want to find a procedure to choose an N-tuple minimizing a certain criterion that is more efficient than total enumeration. The criterion to be minimized can be very general since the procedure developed is based on dynamic programming which is able to deal with general cost functions. Examples can be minimizing the total distance traveled by the agents Minimize

N X

kbi ai k;

i D1

the total traveling time Minimize

N X i D1

kbi ai k=k#i k;

Optimal Formation Switching

211

or the maximum traveling time Minimize max kbi ai k=k#i k: i D1;:::;N

We are also interested in selecting the traveling velocities of each agent. Assuming constant velocities, these are given by #i .t/ D #i D vi

bi ai ; kbi ai k

where the constant speeds are selected from a discrete set D fVmin ; : : : ; Vmax g. Moreover, we are also interested in avoiding collision between agents. We say that two agents i , k (with i ¤ k) do not collide if their trajectories maintain a certain distance apart, at least , at all times. The non-collision conditions is kqi .t/ qk .t/k

8t 2 Œ0; T ;

(1)

where the trajectory is given by qi .t/ D ai C #i .t/t;

t 2 Œ0; T :

We can then define a logic-valued function c as c.ai ; bi ; vi ; ak ; bk ; vk / D

1 if collision between i and k ocurs 0 otherwise

With these considerations, the problem (in the case of minimizing the maximum traveling time) can be formulated as follows: min

max kbi ai k=vi ;

b1 ;:::;bN ;v1 ;:::;vN i D1;:::;N

Subject to bi 2 F 8i; 8i; k with i ¤ k; bi ¤ bk 8i; vi 2 ; c.ai ; bi ; vi ; ak ; bk ; vk / D 0; 8i; k with i ¤ k: Instead of using the set F of d-tuples, we can define a set J D f1; 2; : : : ; M g of indexes to such d-tuples, and also a set I D f1; 2; : : : ; M g of indexes to the agents. Let ji in J be the target position for agent i , that is, bi D fji . Define also the distances dij D kfj ai k which can be pre-computed for all i 2 I and j 2 J . Redefining, without changing the notation, the function c to take as arguments the indexes to the agent positions instead of the positions (i.e., c.ai ; fji ; vi ; ak ; fjk ; vk / is simply represented as c.i; ji ; vi ; k; jk ; vk /), the problem can be reformulated into the form

212

D.B.M.M. Fontes et al.

min

max dij =vi ;

j1 ;:::;jN ;v1 ;:::;vN i D1;:::;N

Subject to ji 2 J 8i 2 I; 8i; k 2 I with i ¤ k; ji ¤ jk 8i 2 I; vi 2 ; c.i; ji ; vi ; ak ; jk ; vk / D 0; 8i; k with i ¤ k:

3 Dynamic Programming Formulation Dynamic programming (DP) is an effective method to solve combinatorial problems of a sequential nature. It provides a framework for decomposing an optimization problem into a nested family of subproblems. This nested structure suggests a recursive approach for solving the original problem using the solution to some subproblems. The recursion expresses an intuitive principle of optimality [2] for sequential decision processes; that is, once we have reached a particular state, a necessary condition for optimality is that the remaining decisions must be chosen optimally with respect to that state.

3.1 Derivation of the Dynamic Programming Recursion: The Simplest Problem We start by deriving a DP formulation for a simplified version of problem: where collision is not considered and different velocities are not selected. The collision avoidance and the selection of velocities for each agent are introduced later. Consider that there are N agents i D 1; 2; : : : ; N to be relocated from known initial location coordinates to target locations indexed by set J . We want to allocate exactly one of the agents to each position in the new formation. In our model a stage i contains all states S such that jS j i , meaning that i agents have been allocated to the targets in S . The DP model has N stages, with a transition occurring from a stage i 1 to a stage i , when a decision is made about the allocation of agent i . Define f .i; S / to be the value of the best allocation of agents 1; 2; : : : ; i to the i targets in set S , that is, the allocation requiring the least maximum time the agents take to go to their new positions. Such value is found by determining the least maximum agent traveling time between its current position and its target position. For each agent, i , the traveling time to the target position j is given by dij =vi . By the previous definition, the minimum traveling time of the i 1 agents to the target positions in set S nfj g is given by f .i 1; S n fj g/. From the above, the minimum traveling time of all i agents to the target positions in S they are assigned to, given that agent i travels at velocity vi , without agent collisions, is obtained by examining all possible target locations j 2 S (see Fig. 1).

Optimal Formation Switching

213

Fig. 1 Dynamic programming recursion for an example with N D 5 and stage i D 4

The dynamic programming recursion is then defined as ˚ f .i; S / D min dij =vi _ f .i 1; S n fj g/ ; j 2S

(2)

where X _ Y denotes the maximum between X and Y . The initial conditions for the above recursion are provided by ˚ f .1; S / D min d1j =v1 ; j 2S

8S J;

(3)

and all other states are initialized as not yet computed. Hence, the optimal value for the performance measure, that is, the minimum traveling time needed for all N agents to assume their new positions in J , is given by f .N; J /:

(4)

3.2 Considering Collision Avoidance and Velocities Selection Recall function c for which c.i; j; vi ; a; b; va / takes value 1 if there is collision between pair of agents i and a traveling to positions j and b with velocities vi and va , respectively, and takes value 0 otherwise. To analyze if the agent traveling through a newly defined trajectory collides with any agent traveling through previously determined trajectories, we define a recursive function. This function checks the satisfaction of the collision condition, given by (1), in turn, between the agent which had the trajectory defined last and each of the agents for which trajectory decisions have already been made. We note that by trajectory we understand not only the path between the initial and final positions but also a timing law and an implicitly defined velocity. Consider that we are in state .i; S / and that we are assigning agent i to target j . Further let vi 1 be the traveling velocity for agent i 1. Since we are solving state .i; S / we need state .i 1; S n fj g/, which has already been computed. (If this is not

214

D.B.M.M. Fontes et al.

Fig. 2 Collision recursion

the case, then we must compute it first.) In order to find out if this new assignment is possible, we need to check if at any point in time agent i , traveling with velocity vi will collide with any of the agents 1; 2; : : : ; i 1 for which we have already determined the target assignment and traveling velocities. Let us define a recursive function C.i; vi ; j; k; V; S / that assumes the value one if a collision occurs between agent i traveling with velocity vi to j and any of the agents 1; 2; : : : ; k , with k < i , traveling to their targets, in set S , with their respective velocities V D Œv1 v2 vk and assumes the value zero if no such collisions occurs. This function works in the following way (see Fig. 2): 1. First it verifies c.i; vi ; j; k; vk ; Bj /, that is, it verifies if there is collision between trajectory i ! j at velocity vi and trajectory k ! Bj at velocity vk , where Bj is the optimal target for agent k when targets in set S n fj g are available for agents 1; 2; : : : ; k. If this is the case it returns the value 1. 2. Otherwise, if they do not collide, it verifies if trajectory i ! j at velocity vi collides with any of the remaining agents. That is, it calls the collision function C .i; vi ; j; k 1; V 0 ; S 0 /, where S 0 D S n fBj g and V D ŒV 0 vk . The collision recursion is therefore written as ˚ C.i; vi ; j; k; V; S / D c.i; vi ; j; k; vk ; Bj / _ C.i; vi ; j; k 1; V 0 ; S 0 /

(5)

where Bj D Bestj .k; V 0 ; S 0 /, V D ŒV 0 vk , S 0 D S n fj g The initial conditions for recursion (5) are provided by C.i; vi ; j; 1; v1 ; fkg/ D fc.i; vi ; j; 1; v1 ; k/g ; 8i 2 I I 8j; k 2 J with j ¤ kI 8vi ; v1 2 . All other states are initialized as not yet computed.

Optimal Formation Switching

215

The dynamic programming recursion for the minimal time-switching problem with collision avoidance and velocities selection is then ˚ f .i; V; S / D min d.i; j /=vi _ f .i 1; V 0 ; S 0 / _ M C.i; vi ; j; i 1; V 0 ; S 0 / ; (6) j 2S

where V D ŒV 0 vi , S 0 D S n fj g, and C is the collision function. The initial conditions are given by f .1; v1 ; fj g/ D fd.1; j /=v1 g ; 8j 2 J and 8v1 2 :

(7)

All other states being initialized as not computed. To determine the optimal value for our problem we have to compute min f .N; V; J /: all N-tuples V

4 Computational Implementation The DP procedure we have implemented exploits the recursive nature of the DP formulation by using a backward–forward procedure. Although a pure forward DP algorithm can be easily derived from the DP recursion, (6) and (7), such implementation would result in considerable waste of computational effort since, generally, complete computation of the state space is not required. Furthermore, since the computation of a state requires information contained in other states, rapid access to state information should be sought. The main advantage of the backward–forward procedure implemented is that the exploration of the state space graph, that is, the solution space, is based upon the part of the graph which has already been explored. Thus, states which are not feasible for the problem are not computed, since only states which are needed for the computation of a solution are considered. The algorithm is dynamic as it detects the needs of the particular problem and behaves accordingly. States at stage 1 are either nonexistent or initialized as given in (3). The DP recursion, (2), is then implemented in a backward–forward recursive way. It starts from the final states .N; V; J / and while moving backward visits, without computing, possible states until a state already computed is reached. Initially, only states in stage 1, initialized by (3), are already computed. Then, the procedure is performed in reverse order, that is, starting from the state last identified in the backward process, it goes forward through computed states until a state .i; V 0 ; S 0 / is found which has not yet been computed. At this point, again it goes backward until a computed state is reached. This procedure is repeated until the final states .N; V; J / for all V are reached with a value that cannot be improved by any other alternative solution. From these we choose the minimum one. The main advantage of this backward–forward recursive algorithm is that only intermediate states needed are visited and from these only the feasible ones that may yield a better solution are computed.

216

D.B.M.M. Fontes et al.

As said before, due to the recursive nature of (2), state computation implies frequent access to other states. Recall that a state is represented by a number, a sequence, and a set. Therefore, sequence operations like adding or removing an element and set operations like searching, deletion, and insertion of a set element must be performed efficiently.

4.1 Sequence Representation and Operation Consider a sequence of length n, or an n-tuple, with k possible values for each element. (In the sequence of our example n D N is the number of agents and k D j j the number of possible velocity values.) There are k n possible sequences to be represented. If sequences are represented by integers in the range 0 k n 1 then it is easy to implement sequence operations such as partitions. Thus, we represent a sequence as a numeral with n digits in the base k. The partition of a sequence with l digits that we are interested on is the one corresponding to the first l 1 digits and the last digit. Such a partition can be obtained by performing the integer division in the base k and taking the remainder of such division. Example 1. Consider a sequence of length n D 4 with k D 3 possible values v0 ; v1 , and v2 . This is represented by numeral with n digits in the base k as Œv1 ; v0 ; v2 ; v1 is represented by1 0 2 13 D 1 33 C 0 32 C 2 31 C 1 30 D 34 Partition of this sequence by the last element can be performed by integer division (DIV) in the base k and taking the remainder (MOD) of such division, V D 1 0 2 13 D 34 can be split into ŒV 0 vi as follows: V 0 D 1 0 23 D 1 32 C 2 30 D 11 D 34 DIV 3 and vi D 13 D 1 D 34 MOD 3:

4.2 Set Representation and Operation A computationally efficient way of storing and operating sets is the bit-vector representation, also called the boolean array, whereby a computer word is used to keep the information related to the elements of the set. In this representation a universal set U D f1; 2; : : : ; ng is considered. Any subset of U can be represented by a binary string (a computer word) of length n in which the i th bit is set to 1 if i is an element of the set, and set to 0 otherwise. So, there is a one-to-one correspondence between all possible subsets of U (in total 2n ) and all binary strings

Optimal Formation Switching

217

Algorithm 1 DP for finding agent–target allocations and corresponding velocities Input: The agent set, locations and velocities, the target set and locations, and the distance function; Compute the distance for every pair agent-target .dij /; Label all states as not yet computed; f .n; V; S/ D 1 ; for all n D 1; 2; : : : ; N , all V with n components, S 2 J ; Initialize states at stage one as ˚ f .1; V; fj g/ D d1j =v1 ; 8V 2 ; j 2 J: Call Comput e.N; V; J / for all sequences V with N components; Output: Solution performance; Call Al locat i on.N; V ; J /; Output: Agent targets and velocities;

of length n. Since there is also a one-to-one correspondence between binary strings and integers, the sets can be efficiently stored and worked out simply as integer numbers. A major advantage of such implementation is that the set operations, location, insertion, or deletion of a set element can be performed by directly addressing the appropriate bit. For a detailed discussion of this representation of sets see, e.g., the book by Aho et al. [1]. Example 2. Consider the Universal set U=f1; 2; 3; 4g of n D 4 elements. This set and any of its subsets can be represented by a binary string of length 4, or equivalently its representation as an integer in the range 0–15. U D f1; 2; 3; 4g is represented by 1111B D 15: A subset A D f1; 3g is represented by 0101B D 5: The flow of the algorithm is managed by Algorithm 1, which starts by labeling all states (subproblems) as not yet computed, that is, it assigns to them a 1 value. Then, it initializes states in stage 1, that is subproblems involving 1 agent, as given by (3). After that, it calls Algorithm 2 with parameters .N; V; J /. Algorithm 2, that implements recursion (2), calls Algorithm 3 to check for collisions every time it attempts to define one more agent–target allocation. This algorithm is used to find out whether the newly established allocation satisfies the collision regarding all previously defined allocations or not, feeding the result back to Algorithm 2. Algorithm 1, called after Algorithm 2 has finished,also implements a recursive function with which the solution structure, that is, the agent–target allocation, is retrieved.

218

D.B.M.M. Fontes et al.

Algorithm 2 Recursive function: compute optimal performance Recursive Compute.i; V; S/; if f .i; V; S/ ¤ 1 then return f .i; V; S/ to caller; end Set min D 1; for each j 2 S 0 do S 0 D S n fj g; V 0 D V DIV nvel; vi D V MOD nvel; Call Collision.i; vi ; j; i 1; V 0 ; S 0 / if Col.i; j; i 1; S 0 / D 0 then Call C omput e .i 1; V 0 ; S 0 /; tij D dij =vi ; aux D max f .i 1; V 0 ; S 0 / ; tij ; if aux mi n then min D aux; bestj D j ; end end end Bj .i; V; S/ D bestj ; value Store information:target Return: f .i; V; S/;

f .i; V; S/ D mi n;

Algorithm 2 is a recursive algorithm that computes the optimal solution cost, that is, it implements (2). This function receives three arguments: the agents to be allocated, their respective velocity values, and the set of target locations available to them, all represented by integer numbers. It starts by checking whether the specific state .i; V; S / has already been computed or not. If so, the program returns to the point where the function was called; otherwise, the state is computed. To compute state .i; V; S /, all possible target locations j 2 S that might lead to a better subproblem solution are identified. The function is then called with arguments (i 1; V 0 ; S 0 ), where V 0 D V DI V nvel (V 0 is the subsequence of v containing the first i 1 elements, and nvel the number of possible velocity values) and S 0 D S n fj g, for every j such that allocating agent i to target j does not lead to any collision with previously defined allocations. This condition is verified by Algorithm 3. Algorithm 3 is a recursive algorithm that checks the collision of a specific agenttarget allocation traveling at a specific velocity with the set of allocations and velocities previously established, that is, it implements (5). This function receives six arguments: the newly defined agent–target allocation i ! j and its traveling velocity vi and the previously defined allocations and respective velocities to check with, that is agents 1; 2; : : : ; k, their velocities and their target locations S . It starts by checking the collision condition, given by (1), for the allocation pair i ! j traveling at velocity vi and k ! Bj traveling at velocity vk , where Bj is the optimal target for agent k when agents 1; 2; : : : ; k are allocated to targets in S . If there is collision it returns 1; otherwise it calls itself with arguments .i; vi ; j; k 1; V 0 ; S n fBj g/. Algorithm 4 is also a recursive algorithm and it backtracks through the information stored while solving subproblems, in order to retrieve the solution structure, that is, the actual agent–target allocation and agent velocity. This algorithm works

Optimal Formation Switching

219

Algorithm 3 Recursive function: find if the trajectory of the allocation i ! j at velocity vi collides with any of the existing allocations to the targets in S at the specified velocities in V Recursive Collision.i; vi ; j; k; V; S/; if Col .i; vi ; j; k; V; S/ ¤ 1 then return C ol .i; vi ; j; k; V; S/ to caller; end Bj D Bj .k; V; S/; if collision condition is not satisfied then Col .i; vi ; j; k; V; S/ D 1; return C ol .i; vi ; j; k; V; S/ to caller; end S 0 D S n fBj g; V 0 D V DIV nvel; vk D V MOD nvel; Call Collision.i; vi ; j; k 1; V 0 ; S 0 /; Store information:

C ol .i; vi ; j; k; V; S/ D 0;

Return: C ol .i; vi ; j; k; V; S/;

Algorithm 4 Recursive function: retrieve agent–target allocation and agents velocity Recursive Allocation.i; V; S/; if S ¤ ¿ then vi D VMODmvel; j DtargetBj .i; V; S/; Vloc.i / D vi ; Alloc.i / D j ; V 0 D VDI V nvel; S 0 D S n fj g; CALL Allocation.i 1; V 0 ; S 0 /; end Return: Alloc;

backward from the final state .N; V ; J /, corresponding to the optimal solution obtained, and finds the partition by looking at the agent traveling velocity vN D V MOD nvel and at the target stored for this state Bj .N; V ; J /, with which it can build the structure of the solution found. Algorithm 3 receives three arguments: the agents, their traveling velocity, and the set of target locations. It starts by checking whether the agent current locations set is empty. If so, the program returns to the point where the function was called; otherwise the backtrack information of the state is retrieved and the other needed states evaluated.

220

D.B.M.M. Fontes et al.

5 An Example An example is given to show how agent–target allocations are influenced by imposing that no collisions are allowed both with a single fixed velocity value for all agents and with the choice of agent velocities from three different possible values. In this example we have decided to use dij as the Euclidian distance although any other distance measure may have been used. The separation constraints impose, at any point in time, the distance between any two agent trajectories to be at least 15 points; otherwise it is considered that those two agents collide. Consider four agents, A, B, C, and D with random initial positions as given in Table 1 and four target positions 1, 2, 3, and 4 in a diamond formation as given in Table 2. We also consider three velocity values: v1 D 10, v2 D 30, v3 D 50. In Fig. 3 we give the graphical representation of the optimal agent–target allocation found, when a single velocity value is considered and collisions are allowed and no collisions are allowed, respectively. As it can be seen in the top part of Fig. 3, that is, when collisions are allowed, the trajectory of agents A and D do not remain apart, by 15 points, at all times. Therefore, when no collisions are enforced the agent–target allocation changes with an increase in the time that it takes for all agents to assume their new positions. In Fig. 4 we give the graphical representation of an optimal agent–target allocation found, when there are three possible velocity values to choose from and collisions are allowed and no collisions are allowed, respectively. As it can be seen in the top part of the Fig. 4, that is, when collisions are allowed, the trajectory of agents A and D do not remain apart, by 15 points, at all times, since the agents move at the same velocity. Therefore, when no collisions are enforced although the agent–target allocation remains the same, agent A has it velocity decreased and therefore its trajectory no longer collides with the trajectory of agent D. Furthermore, since agents A trajectory is smaller this can be done with no increase in the time that it takes for all agents to assume their new positions. Table 1 Agents random initial location

Location xi yi Agent A Agent B Agent C Agent D

35 183 348 30

Target 1 Target 2 Target 3 Target 4

Location xi yi 95 258 294 258 195 169 195 347

Table 2 Target locations, in diamond formation

185 64 349 200

Optimal Formation Switching

221

Fig. 3 Comparison of solutions with and without collision for the single velocity case

6 Conclusion We have developed an optimization algorithm to decide how to reorganize a formation of vehicles into another formation of different shape with collision avoidance and agent traveling velocity choice, which is a relevant problem in cooperative control applications. The method proposed here should be seen as a component of a framework for multiagent coordination/cooperation, which must necessarily include other components such as a trajectory control component.

222

D.B.M.M. Fontes et al.

Fig. 4 Comparison of the solutions with and without collision for the velocity choice case

The algorithm proposed is based on a dynamic programming approach that is very efficient for small dimensional problems. As explained before, the original problem is solved by combining, in an efficient way, the solution to some subproblems. The method efficiency improves with the number of times the subproblems are reused, which obviously increases with the number of feasible solutions. Moreover, the proposed methodology is very flexible, in the sense that it easily allows for the inclusion of additional problem features, e.g., imposing geometric constraints on each agent or on the formation as a whole, using nonlinear trajectories, among others.

Optimal Formation Switching

223

Acknowledgements Research supported by COMPETE & FEDER through FCT Projects PTDC/EEA-CRO/100692/2008 and PTDC/EEA-CRO/116014/2009.

References 1. Aho, A.V., Hopcroft, J.E., Ullman, J.D.: Data Structures and Algorithms. Addison-Wesley, Reading MA (1983) 2. Bellman, R.: Dynamic Programming. Princeton University Press, Princeton, USA (1957) 3. Bender, J.G.: An overview of systems studies of automated highway systems. IEEE Trans. Vehicular Tech. 40(1 Part 2), 82–99 (1991) 4. Buzogany, L.E., Pachter, M., d’Azzo, J.J.: Automated control of aircraft in formation flight. In: AIAA Guidance, Navigation, and Control Conference and Exhibit, 1349–1370, Monterey, California (1993) 5. Desai, J.P., Ostrowski, P., Kumar, V.: Modeling and control of formations of nonholonomic mobile robots. IEEE Trans. Robotic Autom. 17(6), 905–908 (2001) 6. Fontes, D.B.M.M., Fontes, F.A.C.C.: Optimal reorganization of agent formations. WSEAS Trans. Syst. Control. 3(9), 789–798 (2008) 7. Fontes, D.B.M.M., Fontes, F.A.C.C.: Minimal switching time of agent formations with collision avoidance. Springer Optim. Appl. 40, 305–321 (2010) 8. Fontes, F.A.C.C., Fontes, D.B.M.M., Caldeira, A.C.D.: Model predictive control of vehicle formations. In: Pardalos, P., Hirsch, M.J., Commander, C.W., Murphey, R. (eds.) Optimization and Cooperative Control Strategies. Lecture Notes in Control and Information Sciences, Vol. 381. Springer Verlag, Berlin (2009). ISBN: 978-3-540-88062-2 9. Hu, J., Sastry, S.: Optimal collision avoidance and formation switching on Riemannian manifolds. In: IEEE Conference on Decision and Control, IEEE 1998, vol. 2, 1071–1076 (2001) 10. Jin, Z., Shima, T., Schumacher, C.J.: Optimal scheduling for refueling multiple autonomous aerial vehicles. IEEE Trans. Robotic. 22(4), 682–693 (2006) 11. Murray, R.M.: Recent research in cooperative control multivehicle systems. J. Dyn. Syst. Meas. Control. 129, 571–583 (2007) 12. Rasmussen, S.J., Shima, T.: Branch and bound tree search for assigning cooperating UVAs to multiple tasks. In: Institute of Electrical and Electronic Engineers, American Control Conference 2006, Minneapolis, Minnesota, USA (2006) 13. Rasmussen, S.J., Shima, T., Mitchell, J.W., Sparks, A., Chandler, P.R.: State-space search for improved autonomous UAVs assignment algorithm. In: IEEE Conference on Decision and Control, Paradise Island, Bahamas (2004) 14. Schumacher, C.J., Chandler, P.R., Rasmussen, S.J.: Task allocation for wide area search munitions via iterative network flow. In: American Institute of Aeronautics and Astronautics, Guidance, Navigation, and Control Conference 2002, Reston, Virginia, USA (2002) 15. Schumacher, C.J., Chandler, P.R., Rasmussen, S.J.: Task allocation for wide area search munitions with variable path length. In: Institute of Electrical and Electronic Engineers, American Control Conference 2003, New York, USA (2003) 16. Smith, T.R., Hanssmann, H., Leonard, N.E.: Orientation control of multiple underwater vehicles with symmetry-breaking potentials. In IEEE Conf. Decis. Control. 5, 4598–4603 (2001) 17. Swaroop, D., Hedrick, J.K.: Constant spacing strategies for platooning in automated highway systems. J. Dyn. Syst. Meas. Control. 121, 462 (1999) 18. Wolfe, J.D., Chichka, D.F., Speyer, J.L.: Decetntralized controllers for unmanned aerial vehicle formation flight. In: AIAA Guidance, Navigation, and Control Conference and Exhibit, 96–3833, San Diego, California (1996)

224

D.B.M.M. Fontes et al.

19. Yamagishi, M.: Social rules for reactive formation switching. Technical Report UWEETR2004-0025. Department of Electrical Engineering, University of Washington, Seattle, Washington, USA (2004) 20. Yamaguchi, H.: A cooperative hunting behavior by mobile-robot troops. Int. J. Robotic. Res. 18(9), 931 (1999) 21. Yamaguchi, H., Arai, T., Beni, G.: A distributed control scheme for multiple robotic vehicles to make group formations. Robotic. Autonom. Syst. 36(4), 125–147 (2001)

Computational Studies of Randomized Multidimensional Assignment Problems Mohammad Mirghorbani, Pavlo Krokhmal, and Eduardo L. Pasiliao

Abstract In this chapter, we consider a class of combinatorial optimization problems on hypergraph matchings that represent multidimensional generalizations of the well-known linear assignment problem (LAP). We present two algorithms for solving randomized instances of MAPs with linear and bottleneck objectives that obtain solutions with guaranteed quality. Keywords Multidimensional assignment problem • Hypergraph matching problem • Probabilistic analysis

1 Introduction In the simplest form of the assignment problem, two sets V and W with size jV j D jW j D n are given. The goal is to find a permutation of the elements of W , D .j1 ; j2 ; : : : ; jn /, where the i th element of V isPassigned to the element ji D .i / from W in such a way that the cost function niD1 ai .i / is minimized. Here, aij is the cost of assigning element i of V to the element j of W . This problem is widely known as the classical linear assignment problem (LAP). The LAP can be

M. Mirghorbani Department of Mechanical and Industrial Engineering, The University of Iowa, 801 Newton Road Iowa City, IA 52246, USA e-mail: [email protected] P. Krokhmal () Department of Mechanical and Industrial Engineering, The University of Iowa, 3131 Seamans Center, Iowa City, IA 52242, USA e-mail: [email protected] E.L. Pasiliao Air Force Research Lab, Eglin AFB, 101 West Eglin. Boulevard, Eglin AFB, FL, USA e-mail: [email protected] 225 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 12, © Springer Science+Business Media New York 2012

226

M. Mirghorbani et al.

Fig. 1 The underlying bi-partite graph for an assignment problem with n D 4

represented by a complete weighted bipartite graph G D .V; W I E/, with node sets V and W , where jV j D jW j D n and weight aij for the edge .vi ; wj / 2 E (Fig. 1), such that an optimal solution for LAP corresponds to a minimum-weight matching in the bipartite graph G. The LAP is well known to be polynomially solvable in O.n3 / time using the celebrated Hungarian method [11]. A mathematical programming formulation of the LAP reads as Ln

D min

xij 2f0;1g

s. t.

n n X X

aij xij

i D1 j D1 n X

xij D 1;

j D 1; : : : ; n;

xij D 1;

i D 1; : : : ; n;

i D1 n X

(1)

j D1

where it is well known that the integrality of variables xij can be relaxed: 0 xij 1. The LAP also admits the following permutation-based formulation: min

2˘

n X

ai .i / ;

(2)

i D1

where ˘ is the set of all permutations of the set f1; : : : ; ng. Multidimensional extensions of the bipartite graph matching problems, such as the LAP, quadratic assignment problem (QAP), and so on, can be presented in the framework of hypergraph matching problems. A hypergraph H D .V; E/, also called a set system, is a generalization of the graph concept, where a hyperedge may connect two or more vertices from the set V: ˇ (3) E D fe V ˇ jej 2g;

Computational Studies of Randomized Multidimensional Assignment Problems

227

Fig. 2 A perfect matching in a 3-partite 3-uniform hypergraph

A hypergraph is called k-uniform if all its hyperedges have the size k: ˇ E D fe 2 V ˇ jej D kg: Observe that a regular graph is a 2-uniform hypergraph. A subset V 0 V of vertices is called independent if the vertices in V 0 do not share any edges; if V can be partitioned into d independent subsets, V D [dkD1 Vk , then V is called d -partite. Let Hd jn be a complete dˇ-partite n-uniform hypergraph, where each independent ˇ set Vk has n vertices. Then ˇV.Hd jn /ˇ D n d , and the total number of hyperedges is equal to nd . A perfect matching on Hd jn is formed by a set of n hyperedges that do not share any vertices: ˇ ˚ D fe1 ; : : : ; en g ˇ ei 2 E; ei \ ej D ;; i; j 2 f1; : : : ; ng; i ¤ j : Figure 2 shows a perfect matching in a 3-partite 3-uniform hypergraph. If the cost of hypergraph matching is given by function ˚./, the general combinatorial optimization problem on hypergraph matchings can be stated as ˇ n o ˇ min ˚./ ˇ 2 M.Hd jn / ;

(4)

where M.Hd jn / is the set of all perfect matchings on Hd jn . The mathematical programming formulation of the hypergraph matching problem (4) is also generally known as multidimensional assignment problem (MAP). To derive the mathematical programming formulation of (4), note that according to the definition of Hd jn , each of its hyperedges contains exactly one vertex from each of the independent sets V1 ; : : : ; Vd and therefore can be represented as a vector .i1 ; : : : ; id / 2 f1; : : : ; ngd , where, with abuse of notation, the set f1; : : : ; ng is used to label the nodes of each independent subset Vk . Then, the set M.Hd jn / of perfect matchings on Hd jn can be represented in a mathematical programming form as

228

M. Mirghorbani et al.

( M.Hd jn / D

x 2 f0; 1g

nd

ˇ ˇ ˇ ˇ ˇ

X

xi1 id D 1; ir 2 f1; : : : ; ng;

ik 2f1;:::;ng k2f1;:::;d gnfrg

)

r 2 f1; : : : ; d g ;

(5)

where xi1 id D 1 if the hyperedge .i1 ; : : : ; id / is included in the matching, and xi1 id D 0 otherwise. Depending on the particular form of ˚, a number of combinatorial optimization problems on hypergraph matchings can be formulated. For instance, if the cost function ˚ in (4) is defined as a linear form over the variables xi1 id , n P

˚.x/ D

n P

i1 D1

id D1

i1 id xi1 id ;

(6)

one obtains the so-called linear multidimensional assignment problem (LMAP): D Zd;n

min x2f0;1gn

s. t.

n X d

n X

i1 D1

id D1

n X

n X

i2 D1 n X

i1 D1

xi1 id D 1;

i1 D 1; : : : ; n;

id D1

i1 D1 n X

i1 id xi1 id

n X

n X

ik1 D1 ikC1 D1

n X

xi1 id D 1;

ik D 1; : : : ; n;

id D1

k D 2; : : : ; d 1;

n X

xi1 id D 1;

id D 1; : : : ; n:

(7)

id 1 D1

Clearly, a special case of (7) with d D 2 is nothing else but the classical LAP (1). The dimensionality parameter d in (7) stands for the number of “dimensions” of the problem, or sets of elements that need to be assigned to each other, while the parameter n is known as the cardinality parameter. If the cost of the matching on hypergraph Hd jn is defined as the cost of the most expensive hyperedge in the matching, i.e., the cost function ˚.x/ has the form ˚.x/ D

max

i1 ;:::;id 2f1;:::;ng

i1 id xi1 id ;

we obtain the multidimensional assignment problem with bottleneck objective (BMAP):

Computational Studies of Randomized Multidimensional Assignment Problems Wd;n D

min x2f0;1gn

s. t.

d

max

i1 ;:::;id 2f1;:::;ng n X

i2 D1 n X

i1 id xi1 id

xi1 id D 1;

i1 D 1; : : : ; n;

id D1 n X

i1 D1 n X

n X

229

n X

ik1 D1 ikC1 D1 n X

i1 D1

n X

xi1 id D 1;

ik D 1; : : : ; n;

id D1

k D 2; : : : ; d 1; xi1 id D 1;

id D 1; : : : ; n:

(8)

id 1 D1

Similarly, taking the hypergraph matching cost function ˚ in (4) as a quadratic form d over x 2 f0; 1gn , ˚.x/ D

n P i1 D1

n n P P id D1 j1 D1

n P jd D1

i1 id j1 jd xi1 id xj1 jd ;

(9)

we arrive at the quadratic multidimensional assignment problem (QMAP), which represents a higher-dimensional generalization of the classical QAP. The LMAP was first introduced by Pierskalla [12], and has found applications in the areas of data association, sensor fusion, multisensor multi-target tracking, peer-to-peer refueling of space satellites, etc. for a detailed discussion of the applications of the LMAP, see, e.g., [3, 4]. In [2], a two-step method based on bipartite and multidimensional matching problem is proposed to solve the roots of a system of polynomial equations that avoid possible degeneracies and multiple roots encountered in some conventional methods. MAP is used in the course timetabling problem, where the goal is to assign students and teachers to classes and time slots [5]. In [1] a composite neighborhood structure with a randomized iterative improvement algorithm for the timetabling problem with a set of hard and soft constraints is proposed. An application of MAP in the scheduling of sport competitions that take place in different venues is studied in [15]. The characteristic of this study is that venues, that can involve playing fields, courts, or drill stations, are considered as part of the scheduling process. In [13] a Lagrangian relaxation based algorithm is proposed for the multi-target/multisensor tracking problem, where multiple sensors are used to identify targets and estimate their states. To accurately achieve this goal, the data association problem which is an NP-hard problem should be solved to partition observations into tracks and false alarms. A general class of these data association problems can be formulated as a multidimensional assignment problem with a Bayesian estimation as the objective function. The optimal solution yields the maximum a posteriori estimate. A special case of multiple-target tracking problem is studied in [14] to track the flight paths of charged elementary particles near to their primary point of interaction. The three-dimensional assignment problem is used in [6] to formulate a peer-to-peer

230

M. Mirghorbani et al.

(P2P) satellite refueling problem. P2P strategy is an alternative to the single vehicle refueling system where all satellites share the responsibility of refueling each other on an equal footing. The remainder of this chapter is organized as follows: In Sect. 2, heuristic methods to solve multidimensional assignment problems will be provided. Section 2.1 describes the method to solve MAPs with large cardinality. In Sect. 2.2, the heuristic method for MAPs with large dimensionality is explained. Section 3 contains the numerical results and comparison with exact methods, and finally in Sect. 4, conclusions and future extensions are provided.

2 High-quality Solution Sets in Randomized Multidimensional Assignment Problems In this section two methods will be described that can be used to obtain mathematically proven high-quality solutions for MAPs with large cardinality or large dimensionality. These methods utilize the concept of index graph of the underlying hypergraph of the problem.

2.1 Random Linear MAPs of Large Cardinality In the case when the cost ˚ of hypergraph matching is a linear function of hyperedges’ costs, i.e., for MAPs with linear objectives, a useful tool for constructing high-quality solutions for instances with large cardinality (n 1) is the so-called index graph. The index graph is related to the concept of line graph in that the vertices of the index graph represent the hyperedges of the hypergraph. Namely, by indexing each vertex of the index graph G D .V ; E / by .i1 ; : : : ; id / 2 f1; : : : ; ngd , identically to the corresponding hyperedge of Hd jn , the set of vertices V can be partitioned into n subsets Vk , also called levels, which contain vertices whose first index is equal to k: V D

n [

Vk ;

ˇ Vk D f.k; i2 ; : : : ; id / ˇ i2 ; : : : ; id 2 f1; : : : ; ngg:

kD1

For any two vertices i; j 2 V , an edge .i; j / exists in G , .i; j / 2 E , if and only if the corresponding hyperedges of Hd jn do not have common nodes (Fig. 3). In other words, ˇ E D f.i; j / ˇ i D .i1 ; : : : ; id /; j D .j1 ; : : : ; id / W ik ¤ jk ; k D 1; : : : ; ng: Then, that it is easy to see that G has the following properties.

Computational Studies of Randomized Multidimensional Assignment Problems

231

Fig. 3 The index graph G of the hypergraph Hd jn shown in Fig. 2. The vertices of G shaded in gray represent a clique (or, equivalently, a perfect matching on Hd jn )

Lemma 1. Consider a complete, d -partite, n-uniform hypergraph Hd jn D .V; E/, S where jEj D nd , and V D dkD1 Vk such that Vk \ Vl D ;, k ¤ l, and jVk j D n, k D 1; : : : ; d . Then, the index graph G D .V ; E / of Hd jn satisfies: S 1. G is n-partite, namely V D nkD1 Vk , Vi \ Vj D ; for i ¤ j , where each Vk is an independent set in V : for any i; j 2 Vk one has .i; j / … E . 2. jVk j D nd 1 for each k D 1; : : : ; n. 3. The set of perfect matchings in Hd jn is isomorphic to the set of n-cliques in G , i.e., each perfect matching in Hd jn corresponds uniquely to a (maximum) clique of size n in G . Let us denote by G .˛n / the induced subgraph of the index graph G obtained by randomly selecting ˛n vertices from each level Vk of G , and also define N.˛n / to be the number of cliques in G .˛n /, then based on the following lemma [9] one can select ˛n in such a way that G .˛n / is expected to contain at least one n-clique: Lemma 2. The subgraph G .˛n / is expected to contain at least one n-clique, or a perfect matching on Hd jn (i.e., EŒN.˛n / 1) when ˛n is equal to ˛n D

nd 1 nŠ

d 1 n

:

(10)

In the case when the cost coefficients i1 id of MAP with linear or bottleneck objective are drawn independently from a given probability distribution, Lemma 2 can be used to construct high-quality solutions. The approach is to create the subgraph Gmin .˛n /, also called the ˛-set, from the index graph G of the MAP by selecting ˛n nodes with the smallest cost coefficients from each partition (level) of G . If the costs of the hyperedges of Hd jn , or, equivalently, vertices of G , are identically and independently distributed, the ˛-set is expected to contain at least one clique, which represents a perfect matching in the hypergraph Hd jn (Fig. 2). It should be noted that since the ˛-set is created from the nodes with the smallest cost coefficients, if a clique exists in the ˛-set, the resulting cost of the perfect matching is expected to be close to the optimal solution of the MAP.

232

M. Mirghorbani et al.

Importantly, when the cardinality n of the MAP increases, the size of the subgraph G .˛n / or Gmin .˛n / grows only as O.n/, as evidenced by the following observation: Lemma 3. If d is fixed and n ! 1, then ˛n monotonically approaches a finite limit: ˛n % ˛ WD de d 1 e as n % 1: (11) Corollary 1. In the case of randomized MAP of large enough cardinality n 1 expected to contain a high-quality feasible solution of the MAP can the subset Gmin simply be chosen as Gmin .˛/, where ˛ is given by (11). Observe that using the ˛-set Gmin .˛/ for construction of a low-cost feasible solution to randomized MAP with linear or bottleneck objectives may prove to be a challenging task, since it is equivalent to finding an n-clique in an n-partite graph; moreover, the graph Gmin .˛/ is only expected to contain a single n-clique (feasible solution). The following variation of Lemma 2 allows for constructing a subgraph of G that contains exponentially many feasible solutions:

Lemma 4. Consider the index graph G of the underlying hypergraph Hd jn of a randomized MAP, and let d 1 n ˇn D 2 d 1 : (12) nŠ n Then, the subgraph G .ˇn / is expected to contain 2n n-cliques, or, equivalently, perfect matching on Hd jn . Proof. The statement of the lemma is easy to obtain by regarding the feasible solutions of the MAP as paths that contain exactly one vertex in each of the n G . Namely, “levels” V1 ; : : : ; Vn of the index graph let us call apath connectingthe

2 V1 , 2; i2 ; : : : ; id 2 V2 , . . . , n; i2 ; : : : ; id 2 vertices 1; i2 ; : : : ; id o n .1/ .2/ .n/ Vn feasible if ik ; ik ; : : : ; ik is a permutation of the set f1; : : : ; ng for every k D 2; : : : ; d . Note that from the definition of the index graph G it follows that a path is feasible if and only if the vertices it connects form an n-clique in G . Next, observe that a path in G chosen at random is feasible with the probability nŠ d 1 , since one can construct nn.d 1/ different (not necessarily feasible) paths in nn G . Then, if we randomly select ˇn vertices from each set Vk in such a way that out of the .ˇn /n paths spanned by G .ˇn / at least 2n are feasible, the value of ˇn must satisfy: d 1 nŠ n 2n ; .ˇn / nn .1/

.1/

.2/

.2/

.n/

.n/

from which it follows immediately that ˇn must satisfy (12). Corollary 2. If d is fixed and n ! 1, then ˇn monotonically approaches a finite limit: ˇn % ˇ WD d2e d 1 e as n % 1:

Computational Studies of Randomized Multidimensional Assignment Problems

233

Remark 1. Since the value of the parameter ˇn (12) is close to the double of the parameter ˛n (10), the subgraph Gmin .ˇn /, constructed from selecting ˇn nodes with the smallest cost coefficients from each partition (level) of G will be called the “2˛-set,” or G .2˛/. Following [10], the costs of feasible solutions of randomized MAPs with linear or bottleneck objectives that are contained in the ˛- or 2˛-sets can be shown to satisfy: Lemma 5. Consider a randomized MAP with linear or bottleneck objectives, whose cost coefficients are iid random variables from a continuous distribution F with a finite left endpoint of the support, F 1 .0/ > 1. Then, for a fixed d 3 and large enough values of n, if the subset Gmin .˛/ (or, respectively, Gmin .ˇ/) contains a feasible solution of the MAP, the cost Zn of this solution satisfies .n 1/F 1 .0/ C F 1

1 nd 1

Zn nF 1

3 ln n ; nd 1

n 1;

(13)

in the case of MAP with linear objective (7), while in the case of MAP with bottleneck objective (8) the cost Wn of such a solution satisfies F

1

1 nd 1

Wn F

1

3 ln n ; nd 1

n 1:

(14)

2.2 Random MAPs of Large Dimensionality In cases where the cardinality of the MAP is fixed, and its dimensionality is large, d 1, the approach described in Sect. 2.1 based on the construction of ˛- or 2˛subset of the index graph G of the MAP is not well suited, since in this case the size of G .˛/ grows exponentially in d . However, the index graph G of the underlying hypergraph Hd jn of the MAP can still be utilized to construct high-quality solutions of large-dimensionality randomized MAPs. n o .1/ .1/ .n/ .n/ Let us call two matchings i D i1 ; : : : ; id ; : : : ; i1 ; : : : ; id and o n .1/ .1/ .n/ .n/ on the hypergraph Hd jn disjoint if j D j1 ; : : : ; jd ; : : : ; j1 ; : : : ; jd .k/ .k/ .`/ .`/ ¤ j1 ; : : : ; jd i1 ; : : : ; id

for all 1 k; ` n;

or, in other words, if i and j do not have any common hyperedges. It is easy to see that if the cost coefficients of randomized MAPs are iid random variables, then the costs of the feasible solutions corresponding to the disjoint matchings are also independent and identically distributed.

234

M. Mirghorbani et al.

Next, we show how the index graph G of the MAP can be used to construct exactly nd 1 disjoint solutions whose costs are iid random variables. First, recalling the interpretation of feasible MAP solutions as paths in the index graph G , we observe that disjoint solutions of MAP, or, equivalently, disjoint matchings on Hd jn are represented by disjoint paths in G that do not have common vertices. Note that since each level Vk of G contains exactly nd 1 vertices (see Lemma 1), there may be no set of disjoint paths with more than nd 1 elements. On the other hand, recall that a (feasible) path G can be described as a set of n vectors o n .1/

.1/

.n/

.n/

; D i1 ; : : : ; id ; : : : ; i1 ; : : : ; id n o .1/ .n/ such that ik ; : : : ; ik is a permutation of the set f1; : : : ; ng for each k D 1; : : : ; d . .1/ .1/ Then, for any given vertex v.1/ D 1; i2 ; : : : ; id 2 V1 , let us construct a feasible path containing v.1/ in the form o n .1/ .1/ .2/ .2/ .n/ .n/ ; 1; i2 ; : : : ; id ; 2; i2 ; : : : ; id ; : : : ; n; i2 id where for k D 2; : : : ; d and r D 2; : : : ; n ( .r/ ik

n In other words,

D

.1/

.r1/

ik

.r1/

C 1; if ik 1; if

.n/

ik ; : : : ; ik

.r1/ ik

D 1; : : : ; n 1; D n:

(15)

o is a forward cyclic permutation of the set

d 1 f1; vertices k D 2; : : : ; d . Applying (15) to each of the n : : : ; ng for any .1/ .1/ d 1 2 V1 , we obtain n feasible paths (matchings on Hd jn ) that 1; i2 ; : : : ; id are mutuallydisjoint, since (15) defines a bijective mapping between any vertex .k/ .k/ (hyperedge) k; i2 ; : : : ; id from the set Vk , k D 2; : : : ; n, and the corresponding

vertex (hyperedge) v.1/ 2 V1 . Then, if hyperedge costs i1 id in the linear or bottleneck MAPs (7) and (8) are stochastically independent, the costs ˚.1 /; : : : ; ˚.nd 1 / of the nd 1 disjoint matchings 1 ; : : : ; nd 1 defined by (15) are also independent, as they do not contain any common elements i1 id . Given that the optimal solution cost Zd;n (respectively, Wd;n ) of randomized linear (respectively, bottleneck) MAP does not exceed the costs ˚.1 /,. . . , ˚.nd 1 / of the disjoint solutions described by (15), the following bound on the optimal cost of linear or bottleneck randomized MAP can be established. , Wd;n of random MAPs with linear or bottleneck Lemma 6. The optimal costs Zd;n objectives (7), (8), where cost coefficients are iid random variables, satisfy P

Zd;n X1Wnd 1 ;

max Wd;n X1Wn d 1 ;

(16)

Computational Studies of Randomized Multidimensional Assignment Problems

235

P

where Xi , Ximax .i D 1; : : : ; nd 1 / are iid random variables with distributions P ;max F that are determined by the form of the corresponding objective function, and X1Wk denotes the minimum-order statistic among k iid random variables. Remark 2. Inequalities in (16) are tight: namely, in the special case of random MAPs with n D 2, all of the nŠd 1 D 2d 1 feasible solutions are stochastically independent [7], whereby equalities hold in (16). As shown in [10], the following quality guarantee on the minimum cost of the nd 1 disjoint solutions (15) of linear and bottleneck MAPs can be established: d 1 P X1Wnd 1 nF 1 n 2n ;

d 1 max 1 X1Wn n 2n ; d 1 F

d 1;

where F 1 is the inverse of the distribution function F of the cost coefficients i1 id . This observation allows for constructing high-quality solutions of randomized linear and bottleneck MAPs by searching the set of disjoint feasible solutions as defined by (15).

3 Numerical Results Sections 2.1 and 2.2 introduced two methods of solving randomized instances of MAPs by constructing subsets (neighborhoods) of the feasible set of the problem that are guaranteed to contain high-quality solutions whose costs approach optimality when the problem size (n ! 1, or, respectively, d ! 1) increases. In this section we investigate the quality of solutions contained in these neighborhoods for small- to moderate-sized problem instances and compare the results with the optimal solutions where it is possible. Before proceeding with the numerical results of the study, in the next section, FINDCLIQUE, the algorithm that is used to find the optimum clique in the indexgraph G or the first clique in the ˛-set or 2˛-set will be described. The results from randomly generated MAP instances for each of these two methods are presented next.

3.1 Finding n-Cliques in n-Partite Graphs In order to find cliques in G , the ˛-set, or the 2˛-set, the branch-and-bound algorithm proposed in [8] is used. This algorithm, called FINDCLIQUE, is designed to find all n-cliques contained in an unweighed n-partite graph. The input to original FINDCLIQUE is an n-partite graph G.V1 ; : : : ; Vn I E/ with the adjacency matrix M D .mij /, and the output will be a list of all n-cliques

236

M. Mirghorbani et al.

contained in G. Nodes from G are copied into a set called compatible nodes, denoted by C . The set C is further divided into n partitions, each denoted by Ci that are initialized such that they contain nodes from partite Vi , i D f1; : : : ; ng. FINDCLIQUE also maintains two other sets, namely, current clique, denoted by Q and erased nodes, denoted by E. The set Q holds a set of nodes that are pairwise adjacent and construct a clique. The erased node set, E, is furthered partitioned into n sets, denoted by Ei , that are initialized as empty. At each step of the algorithm, Ei will contain the nodes that are not adjacent to the i th node added to Q. The branch-and-bound tree has n levels, and FINDCLIQUE searches for ncliques in the tree in a depth-first fashion. At level t of the branch ˇ of bound algorithm, the index of the smallest partition in C , D arg minfjCi j ˇi … Vg will i

be detected, and C will be marked as visited by including into V fV [ g, where V is the list of partitions that have a node in Q. Then, a node q from C is selected at random and added to Q. If jQj D n, an n-clique is found. Otherwise, C will be updated; every partition Ci where i … V will be searched for nodes cij , .j D 1; : : : ; jCi j/ that are not adjacent to q, i.e., mq;cij D 0. Any such node will be removed from Ci and will be transferred to Et . Note that in contrast to C , nodes in different levels of E will not necessarily be from the same partite of G. Decision regarding backtracking is made after C is updated. It is obvious that in an n-partite graph the following will hold: !.G/ n;

(17)

where !.G/ is the size of a maximum clique in G. In other words, the size of any maximum clique cannot be larger than the number of partites in that the maximum clique can only contain at most one node from each partite of G. If after updating, there is any Ci … V with jCi j D 0, adding qi to Q will not result in a clique of size n, since the condition in (17) changes into strict inequality. In such cases, q is removed from Q, nodes from Et will be transferred back to their respective partitions in C , and FINDCLIQUE will try to add another node from C that is not already branched on, to Q. If such a node does not exist, the list of visited partitions will be updated (V Vn), and FINDCLIQUE backtracks to the previous level of the branch-and-bound tree. If the backtracking condition is not met and q is promising, FINDCLIQUE will go one level deeper in the tree, finds the next smallest partition in the updated C and tries to add a new node to Q. When solving the clique problem in the ˛-set or 2˛-set, since the objective is to find the first n-clique regardless of its cost, FINDCLIQUE can be used without any modifications, and the weights of the nodes in Gmin .˛/ or Gmin .2˛/ will be ignored. However, when the optimal clique with the smallest cost in G is sought, some modifications in FINDCLIQUE are necessary to enable it to deal with weighted graphs. The simplest way to adjust FINDCLIQUE is to compute the weight of the n-cliques as they are found, and report the clique with the smallest cost as the output of the algorithm. This is the method that is used in the experimental studies whenever the optimal solution is desired. However, to obtain a more efficient

Computational Studies of Randomized Multidimensional Assignment Problems

237

algorithm, it is possible to calculate the weight of the partial clique contained in Q in every step of the algorithm and fathom subproblems for which WQ WQ , where WQ and WQ are the cost of the partial clique in Q and the cost of the best clique found so far by the algorithm, respectively. Further improvement can be achieved by sorting the nodes in Ci , i D 1; : : : ; n, based on their cost coefficients, and each time select the untraversed node with the smallest node as the next node to be added to Q (as opposed to randomly selecting a node, which does not change the overall computational time in the unweighted graph if a list of all n-cliques is desired). This enables us to compute a lower bound on the cost of the maximum clique that the nodes in Q may lead to as follows: LBQ D WQ C

X

wmin i ;

(18)

i …V

where wmin is the weight of the node with the smallest cost coefficient in Ci . Any i subproblem with LBQ WQ will be fathomed.

3.2 Random Linear MAPs of Large Cardinality To demonstrate the performance of the method described in Sect. 2.1, random MAPs with fixed dimensionality d D 3 and different values of cardinality n are generated. The cost coefficients i1 id are randomly drawn from the uniform U Œ0; 1 distribution. Three sets of problems are solved for this case: (i) n D 3; : : : ; 8 with d D 3, solved for optimality, and the first clique in the ˛- and 2˛-sets, (ii) n D 10; 15; : : : ; 45, with d D 3, solved for the first clique in the ˛- and 2˛-sets, and finally (iii) n D 50; 55; : : : ; 80, with d D 3, solved for the first clique in the 2˛-set. For each value of n, 25 instances are generated and solved by modified FINDCLIQUE for the optimum clique or FINDCLIQUE whenever the first clique in the problem is desired. Algorithm is terminated if the computational time needed to solve an instance exceeds 1 h. In the first group, (i), instances of MAP that admit solution to optimality in a reasonable time were solved. The results from this subset are used to determine the applicability of Corollary 1 and bounds (13) and (14) for relatively small values of n. Table 1 summarizes the average values for the cost of the clique and computational time needed for MAPs with the linear sum objective function for the instances in group (i). The first column, n, is the cardinality of the problem. The columns under the heading “Exact” contain the values related to the optimal clique in G . The columns under the heading “Gmin .˛n /” represent the values obtained from solving the ˛-set for the first clique, and those under the heading “Gmin .2˛/” represent the values obtained from solving the 2˛-set for the first clique. For each of these multicolumns, T denotes the average computational time in seconds, Z is the average cost of the cliques, jV j is the order of the graph or induced subgraph in

238

M. Mirghorbani et al.

Table 1 Comparison of the computational time and cost for the optimum clique and the first clique found in G .˛/ and G .2˛/ in random MAPs with linear sum objective functions for instances in group (i) Exact Gmin .˛/ Gmin .2˛/ n Tn;3 Zn;3 jV j 9 CLQ TGmin .˛/ ZGmin .˛/ jV j 9 CLQ TGmin .2˛/ ZGmin .2˛/ jV j 9 CLQ 3 0.02 0.604 4 0.01 0.458 5 0.02 0.371 6 0.31 0.374 7 14.83 0.329 8 937.67 0.274

326 463 5124 6215 7342 8511

100 100 100 100 100 100

0.04 0.03 0.04 0.04 0.04 0.05

0.609 0.514 0.399 0.452 0.392 0.329

33 44 54 65 75 85

76 88 72 92 80 72

0.03 0.03 0.03 0.01 0.05 0.04

0.773 0.635 0.571 0.524 0.47 0.478

36 47 58 69 79 810

100 100 100 100 100 100

Table 2 Comparison of the computational time and cost for the optimum clique and the first clique found in G .˛/ and G .2˛/ in random MAPs with linear bottleneck objective functions for instances in group (i) Exact Gmin .˛/ Gmin .2˛/ n Tn;3 Wn;3 jV j 9 CLQ TGmin .˛/ WGmin .˛/ jV j 9 CLQ TGmin .2˛/ WGmin .2˛/ jV j 9 CLQ 3 0.01 0.321 4 0.01 0.205 5 0.01 0.151 6 0.3 0.124 7 14.96 0.098 8 956.6 0.075

326 463 5124 6215 7342 8511

100 100 100 100 100 100

0.03 0.03 0.02 0.04 0.04 0.04

0.324 0.241 0.17 0.166 0.131 0.092

33 44 54 65 75 85

76 88 72 92 80 72

0.04 0.03 0.03 0.04 0.04 0.04

0.439 0.311 0.27 0.219 0.163 0.157

36 47 58 69 79 810

100 100 100 100 100 100

G , Gmin .˛/, or Gmin .2˛/, and 9 CLQ shows the percentage of the problems for which the ˛-set or 2˛-set, respectively, contains a clique. This value is 100% for the exact method. There was no instances in group (i) for which the computational time exceeded 1 h. It is clear that using ˛-set or 2˛-set enables us to obtain a high-quality solution in a much shorter time by merely searching a significantly smaller part of the index graph G . Based on the values for Z, the cost of the clique found in ˛-set or 2˛set are consistently converging to that of the optimal clique and they provide tight upper bounds for the optimum cost. Additionally, as is shown in the jV j column, significant reduction in the size of the graph can be obtained if ˛-set or 2˛-set are used. Table 2 contains the corresponding results for the case of a random MAP with bottleneck objective. In this table, W represents the value for the cost of the optimal clique or the first clique found in ˛- or 2˛-set. Figure 4(a) shows how the cost of an optimum clique compares to the cost of the clique found in ˛-set and 2˛set. Clearly, the cost of optimal clique approaches 0 for both linear sum and linear bottleneck MAPs. Figure 4(b) demonstrates the computational time for instances in group (i). The advantage of using ˛-set over 2˛-set is that the quality of the detected clique is expected to be higher. On average, however, a clique in 2˛-set is found in a shorter time than in ˛-set.

Computational Studies of Randomized Multidimensional Assignment Problems

239

Fig. 4 Solution costs (a) and computational time (b) in random MAPs with linear sum and linear bottleneck objective functions for instances in group (i) Table 3 Comparison of the computational time and cost for the first clique found in G .˛/ and G .2˛/ in random MAPs with linear sum objective functions for instances in group (ii) Gmin .˛/

n TGmin .˛/ 10 0.05 15 0.06 20 0.08 25 0.15 30 0.89 35 8.54 40 100.85 45 405.16

Gmin .2˛/

ZGmin .˛/ 0.266 0.228 0.165 0.147 0.134 0.11 0.097 0.085

jV j 105 156 206 257 307 357 407 457

9 CLQ 60 76 56 80 92 88 92 80

Timeout 16

TGmin .2˛/ 0.05 0.06 0.07 0.08 0.09 0.14 0.46 1.09

ZGmin .2˛/ 0.37 0.313 0.246 0.2 0.171 0.151 0.131 0.122

jV j 1010 1511 2012 2513 3013 3513 4013 4514

9 CLQ 100 100 100 100 100 100 100 100

Timeout -

The second group of problems, (ii), comprises instances that cannot be solved to optimality within 1 h. The range of n for this group is such that the first clique in the ˛-set is expected to be found within 1 h. Tables 3 and 4 summarize the results obtained for this group. Instances with n D 45 were the largest problems in this group for which ˛-set could be solved within 1 h. As it is expected, the 2˛-set can be solved quickly in a matter of seconds where the equivalent problem for ˛-set requires a significantly longer computational time. However, the quality of the solutions found for ˛-set is higher than the quality for solutions in 2˛set. Nonetheless, using 2˛-set increases the odds of finding a clique, as based on Lemma 4, 2˛-set is expected to contain an exponential number of cliques. It is obvious from the 9 CLQ column that not all of the instances in ˛-set contain at least a clique, whereas 100% of the instances in 2˛-set contain one that can be found within 1 h. Column Timeout represents the percentage of the problems that could not be solved within the allocated 1 h time limit. Out of 25 instances solved for

240

M. Mirghorbani et al.

Table 4 Comparison of the computational time and cost for the first clique found in G .˛/ and G .2˛/ in random MAPs with linear bottleneck objective functions for instances in group (ii) Gmin .˛/ Gmin .2˛/ n TGmin .˛/ WGmin .˛/ jV j 9 CLQ Timeout TGmin .2˛/ WGmin .2˛/ jV j 9 CLQ Timeout 10 0.04 0.065 105 60 0.02 0.098 1010 100 15 0.04 0.037 156 76 0.02 0.056 1511 100 20 0.05 0.023 206 56 0.04 0.036 2012 100 25 0.1 0.017 257 80 0.08 0.025 2513 100 30 0.87 0.012 307 92 0.1 0.019 3013 100 35 8.53 0.009 357 88 0.15 0.015 3513 100 40 100.99 0.007 407 92 0.46 0.011 4013 100 45 403.52 0.006 457 80 16 1.09 0.009 4514 100 -

Fig. 5 Comparison of the cost (a) and computational time (b) for MAPs with linear sum and linear bottleneck objective functions for group (ii) and (iii)

n D 45, only 4 (16%) could not be solved in 1 h. Out of the 21 remaining instances, 20 instances contained a clique, and only 1 did not have a clique. The behavior of the average cost values for the problems solved in this group are depicted in Fig. 5. Finally, the third group, (iii), includes instances for which the cardinality of the problem prevents the ˛-set from being solved within 1 h. Thus, for this set, only the 2˛-set is used. The instances of this group were solved with the parameter values n D 50; 55; : : : ; 80 and d D 3. Tables 5 and 6 summarize the corresponding results. When the size of the problem n 55, some instances of problems become impossible to solve within 1 h time limit. The average cost for the instances that are solved keeps the usual trend and converges to 0 as n grows. The largest problems attempted to be solved in this group are MAPs with n D 80. Out of 25 instances of this size, only four could be solved within 1 h. Figure 5(a) the average values of solution cost and computational time for the instances of both linear sum and linear bottleneck MAPs. Note that as the size of the problem increases, the reduction in the size of problem achieved from using ˛-set or 2˛-set becomes significantly larger.

Computational Studies of Randomized Multidimensional Assignment Problems Table 5 Computational time and cost for the first clique found in G .2˛/ in random MAPs with linear sum objective functions for instances in group (iii)

Table 6 Computational time and cost for the first clique found in G .2˛/ in random MAPs with linear bottleneck objective functions for instances in group (iii)

241

Gmin .2˛/

n

TGmin .2˛/

ZGmin .2˛/

jV j

9 CLQ

Timeout

50 55 60 65 70 75 80

1:56 52:29 189:9 568:9 919:79 1556:89 1641:26

0:11 0:099 0:091 0:085 0:078 0:075 0:07

5014 5514 6014 6514 7014 7514 8014

100 96 92 96 64 40 16

4 8 4 36 60 84

Gmin .2˛/

n

TGmin .2˛/

WGmin .2˛/

jV j

9 CLQ

Timeout

50 55 60 65 70 75 80

1:56 52:19 190:6 566:71 920:44 1552:74 1631:89

0.008 0.006 0.005 0.005 0.004 0.004 0.003

5014 5514 6014 6514 7014 7514 8014

100 96 92 96 64 40 16

4 8 4 36 60 84

For instance, in MAP with n D 80 and d D 3, the 2˛-set has 80 14 nodes, while the complete index graph will have 80 802 nodes.

3.3 Random MAPs of Large Dimensionality The second set of problem instances includes MAPs that are solved by the heuristic method explained in Sect. 2.2. Problems in this set have the cardinality n D 2; : : : ; 5 and dimensionality in the range d D 2; : : : ; dNn , where dNn is the largest value for d for which an MAP with cardinality n can be solved within 1 h using the heuristic method. For each pair of .n; d /, 25 instances of MAP with cost coefficients randomly drawn from the uniform U Œ0; 1 distribution are generated. Generated instances are then solved by the modified FINDCLIQUE for the optimal clique (when possible) and the optimal costs are compared with the costs obtained from the heuristic method. The result of the heuristic method for instances with n D 2 is optimal, and the heuristic checks all the 2d 1 solutions of the MAP. Thus, using the modified FINDCLIQUE to find the optimum clique is not necessary. Figure 6 demonstrates the cost convergence in instances with n D 2; 3; 4; 5 for both linear sum and linear bottleneck MAPs. Figure 6(a) demonstrates the cost convergence in MAPs with n D 2 and d D 2; : : : ; 27. Recall that due to Remark 2, for cases with n D 2 the heuristic provides the optimal solution. The heuristic method provides high-quality solutions that are consistently converging to

242

M. Mirghorbani et al.

Fig. 6 Comparison of the cost obtained from the heuristic method with the optimum cost in MAPs with linear sum and linear bottleneck objective functions with (a) n D 2, (b) n D 3, (c) n D 4, and (d) n D 5

the optimal solution for all cases and the average value of the obtained costs from the heuristics approaches 0. Memory limitations, as opposed to computational time, were the restrictive factor for solving larger instances as the computational time for the problems of this set never exceeded 700 s. Figure 7 demonstrates the computational time for the optimal method as well as the heuristic method in instances with n D 2; 3; 4; 5 for both linear sum and linear bottleneck MAPs. The computational time has an exponential trend as the number of solutions for the MAP, or the number of solutions checked by the heuristic grow in an exponential manner. However, the heuristic method is able to find high-quality solutions in significantly shorter time.

Computational Studies of Randomized Multidimensional Assignment Problems

243

Fig. 7 Comparison of the computational time in logarithmic scale needed for the optimal method and the heuristic method in MAPs with linear sum and linear bottleneck objective functions with (a) n D 2, (b) n D 3, (d) n D 4, and (d) n D 5

4 Conclusions In this paper, randomized MAPs that correspond to hypergraph matching problems were studied. Two different methods were provided to obtain guaranteed highquality solutions for MAPs with linear sum or linear bottleneck cost function and fixed dimensionality and fixed cardinality. The computational results demonstrated that the proposed methods provide a tight upper bound on the value of the optimal cost for MAPs in randomized problems. With the first method, problem instances with d D 3 and n as large as 80 are solved. The heuristic provided for problems with fixed cardinality can provide high-quality solutions to problems with large dimensionality in a relatively short time. The limiting factor for the heuristic method is the memory consumption. The structure of the proposed methods makes them suitable for parallel computing. As an extension, the performance of the proposed heuristic in a parallel system will be studied.

244

M. Mirghorbani et al.

References 1. Abdullah, S., Burke, E.K., Mccollum, B.: Using a randomised iterative improvement algorithm with composite neigjhbourhood structures for university course timetabling. In: The Proceedings of the 6th Metaheuristic International Conference [MIC05, pp. 22–26. Book (2005) 2. Bekker, H., Braad, E.P., Goldengorin, B.: Using bipartite and multidimensional matching to select the roots of a system of polynomial equations. In: ICCSA (4), pp. 397–406 (2005) 3. Burkard, R.E.: Selected topics on assignment problems. Discrete Appl. Math. 123(1–3), 257–302 (2002) 4. Burkard, R.E., C ¸ ela, E.: Linear assignment problems and extensions. In: Du, D.-Z., Pardalos, P.M. (eds.) Handbook of Combinatorial Optimization, Supplement Volume A, pp. 75–149. Kluwer Academic Publishers, Dordrecht, (1999) 5. Carter, M.W., Laporte, G.: Recent developments in practical course timetabling. In: Burke, E., Carter, M. (eds.) Practice And Theory Of Automated Timetabling Ii, 2nd International Conference on the Practice and Theory of Automated Timetabling (Patat 97), Toronto, Canada, 20–22 Aug 1997. Lecture Notes In Computer Science, vol. 1408 , pp. 3–19. Springer-Verlag Berlin, Heidelberger Platz 3, D-14197 Berlin, Germany (1998) 6. Dutta, A., Tsiotras, P.: A greedy random adaptive search procedure for optimal scheduling of p2p satellite refueling. In: AAS/AIAA Space Flight Mechanics Meeting, pp. 07–150 (2007) 7. Grundel, D., Krokhmal, P., Oliveira, C., Pardalos, P.: On the number of local minima in the multidimensional assignment problem. J. Combin. Opt. 13(1), 1–18 (2007) 8. Gr¨unert, T., Irnich, S., Zimmermann, H., Schneider, M., Wulfhorst, B.: Finding all k-cliques in k-partite graphs, an application in textile engineering. Comput. Oper. Res. 29(1), 13–31 (2002) 9. Krokhmal, P., Grundel, D., Pardalos, P.: Asymptotic behavior of the expected optimal value of the multidimensional assignment problem. Mathem. Prog. 109(2–3), 525–551 (2007) 10. Krokhmal, P.A., Pardalos, P.M.: Limiting optimal values and convergence rates in some combinatorial optimization problems on hypergraph matchings. Submitted for publication, 3131 Seamans Center, Iowa City, IA 52242, USA, (2011) 11. Kuhn, H.W.: The hungarian method for the assignment problem. Nav. Res. Logist. Quar. 2(1–2), 83–87 (1955) 12. Pierskalla, W.: The multidimensional assignment problem. Oper. Res. 16(2), 422–431 (1968) 13. Poore, A.B.: Multidimensional assignment formulation of data association problems arising from multitarget and multisensor tracking. Comput. Opt. Appl. 3(1), 27–54 (1994) 14. Pusztaszeri, J.F., Rensing, P.E., Liebling, T.M.: Tracking elementary particles near their primary vertex: A combinatorial approach. J. Global Optim. 9(1), 41–64 (1996) 3rd Workshop on Global Optimization, SZEGED, Hungary, Dec 1995. 15. Urban, T.L., Russell, R.A.: Scheduling sports competitions on multiple venues. European J. Oper. Res. 148(2), 302–311 (2003)

On Some Special Network Flow Problems: The Shortest Path Tour Problems Paola Festa

Abstract This paper describes and studies the shortest path tour problems, special network flow problems recently proposed in the literature that have originated from applications in combinatorial optimization problems with precedence constraints to be satisfied, but have found their way into numerous practical applications, such as for example in warehouse management and control in robot motion planning. Several new variants belonging to the shortest path tour problems family are considered and the relationship between them and special facility location problems is examined. Finally, future directions in shortest path tour problems research are discussed in the last section. Keywords Shortest path tour problems • Network flow problems • Combinatorial optimization

1 Introduction Shortest path tour problems (SPTPs) are special network flow problems recently proposed in the literature [14]. Given a weighted directed graph G, the classical SPTP consists of finding a shortest path from a given origin node to a given destination node in the graph G with the constraint that the optimal path should successively pass through at least T one node from given node mutually independent subsets T1 ; T2 ; : : : ; TN , where N kD1 Tk D ;. In more detail, P starts at the origin node (that without loss of generality can be assumed in T1 ), moves to some node in T2 (possibly through some intermediate nodes that are not in T2 ), then moves to some node in T3 (possibly through some intermediate nodes that are not in P. Festa () Department of Mathematics and Applications, University of Napoli FEDERICO II, Compl. MSA, Via Cintia, 80126 Napoli, Italy e-mail: [email protected] A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, 245 Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 13, © Springer Science+Business Media New York 2012

246

P. Festa

T3 , but may be in T1 and/or in T2 ), etc., then finally it moves to the destination node (possibly through some intermediate nodes not equal to the destination, which without loss of generality can be assumed in TN ). The SPTP and the idea behind it were given in 2005 as Exercise 2.9 in Bertsekas’s Dynamic Programming and Optimal Control book [3], where it is asked to formulate it as a dynamic programming problem. Very recently, in [14] it has been proved that the SPTP belongs to the complexity class P. This problem has several practical applications, such as, for example, in warehouse management or control of robot motions. In both cases, there are precedence constraints to be satisfied. In the first case, assume that an order arrives for a certain set of N collections of items stored in a warehouse. Then, a vehicle has to collect at least an item of each collection of the order to ship them to the costumers. In control of robot motions, assume that to manufacture workpieces, a robot has to perform at least one operation selected from a set of N types of operations. In this latter case, operations are associated with nodes of a directed graph and the time needed for a tool change is the distance between two nodes. The remainder of this article is organized as follows. In Sect. 2, the classical SPTP is described and its properties are analyzed. Exact techniques proposed in [14] are also surveyed along with the computational results obtained and analyzed in [14]. In Sect. 3, several new different variants of the classical SPTP are stated and formally described as special facility location problems. Concluding remarks and future directions in SPTPs research are discussed in the last section.

2 Notation and Problem Description Throughout this paper, the following notation and definitions will be used. Let G D .V; A; C / be a directed graph, where • V is a set of nodes, numbered 1; 2; : : : ; n. • A D f.i; j /j i; j 2 V g is a set of m arcs. • C WA! 7 RC [ f0g is a function that assigns a nonnegative length cij to each arc .i; j / 2 A. • For each node i 2 V , let F S.i / D fj 2 V j .i; j / 2 Ag and BS.i / D fj 2 V j .j; i / 2 Ag be the forward star and backward star of node i , respectively. • A simple path P D fi1 ; i2 ; : : : ; ik g is a walk without any repetition of nodes. • The length L.P / of any path P is defined as the sum of lengths of the arcs connecting consecutive nodes in the path. Then, the SPTP can be stated as follows: Definition 1. The SPTP consists of finding a shortest path from a given origin node s 2 V to a given destination node d 2 V in the graph G with the constraint that the optimal path P should successively T pass through at least one node from given node subsets T1 ; T2 ; : : : ; TN , where N kD1 Tk D ;.

On Some Special Network Flow Problems: The Shortest Path Tour Problems

2

1

5 1

2

Classical Shortest Path { (1,3), (3,7) }

5

1

s=1

3

247

3 4

3

d=7 2

1

4 4

6

Shortest Path Tour { (1,3), (3,2), (2,3), (3,7) }

Fig. 1 A SPTP instance on a small graph G

Let us consider the small graph G D .V; A; C / depicted in Fig. 1, where V D fs D 1; 2; : : : ; 7 D d g. It is easy to see that P D f1; 3; 7g is the shortest path from node 1 to node 7 and has length 5. Let us now define on the same small graph G the SPTP instance characterized by N D 4 and the following node subsets T1 D fs D 1g; T2 D f3g; T3 D f2; 4g; T4 D fd D 7g. The shortest path tour from node 1 to node 7 is the path PT D f1; 3; 2; 3; 7g which has length 11 and is not simple, since it passes twice through node 3. When dealing with any given optimization problem (such as SPTP), one is usually interested in classifying it according to its complexity in order to be able to design an algorithm that solves the problem of finding the best compromise between solution quality and computational time required to find that solution. In classifying a problem according to its complexity, polynomial-time reductions are helpful. In fact, deciding the complexity class of an optimization problem P r becomes easy once a polynomial-time reduction to a second problem PN r is available and the complexity of PN r is known, as stated in Definitions 2 and 3 and Theorem 1, whose proof is reported in [17] and several technical books, including [18]. Definition 2. A problem P r is Karp-reducible to a problem PN r (P r <m PN r) if there exists a function f such that x is a positive instance of Pr ” f .x/ is a positive instance of PN r I

(1)

f is called Karp reduction function and an algorithm A that computes f is called a Karp reduction algorithm. If both P r < m PN r and PN r < m P r, P r and PN r are Karp-equivalent (P r m PN r). Definition 3. A problem P r is polynomially Karp-reducible to a problem PN r p (P r <m PN r) if there exists a polynomial-time computable function f such that x is a positive instance of P r ” f .x/ is a positive instance of PN rI

(2)

f is called Karp reduction function and a polynomial-time algorithm A that computes f is called a Karp reduction algorithm.

248

P. Festa

p If both P r <m PN r and PN r p Karp-equivalent (P r m PN r).

p <m P r, P r and PN r are polynomially

p Theorem 1. Let P r and PN r be any two optimization problems such that P r <m PN r , then PN r in the complexity class P of polynomially solvable problems implies P r 2 P.

Hence, Theorem 1 guarantees that problem P r and problem PN r belong to the same complexity class, or in other words problem P r is no harder than problem PN r. In [14], the author used a polynomial-time reduction and theoretical result of Theorem 1 to prove that SPTP belongs to the complexity class P, since it reduces to a single source—single destination shortest path problem (SPP). In the following, for sake of clarity, we report this complexity results stated and proved in [14]. p

Theorem 2. SPTP <m SPP, then SPTP 2 P. Proof. To prove the thesis, a polynomial-time reduction algorithm must be found that transforms any SPTP instance into a single source–single destination SPP instance and vice versa. It is trivial to show that any SPP instance < G D .V; A; C /; s; d > can be polynomially transformed in the SPTP instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N >, where N D 2 and T1 D fsg, T2 D V n fsg. Conversely, there exists a polynomial-time reduction algorithm that transforms any SPTP instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N > into a single source– single destination SPP instance < G 0 D .V 0 ; A0 ; C 0 /; s; d 0 D d C .N 1/ n >, where G 0 is a multistage graph with N stages, each replicating G. Figure 2 depicts the pseudo-code of the reduction algorithm SPTPReduction that performs the following operations. (i) Line 1—V 0 WD f1; 2; : : : ; N ng; A0 WD ;: The set of nodes V 0 and the set of arcs A0 of the multistage graph G 0 are initialized. The set V 0 has n nodes for each stage k 2 f1; : : : ; N g; the set A0 is initially empty. (ii) Loop for in lines 2–12: the stages 1; : : : ; N 1 are constructed. At each iteration, an arc .a; b/ is added to A0 . In particular, for each stage k 2 f1; : : : ; N 1g, for each node v 2 f1; : : : ; ng, and for each adjacent node w 2 F S.v/, .a; b/ D .v C .k 1/ n; w C k n/ with length cvw , if w 2 TkC1 ; .a; b/ D .v C .k 1/ n; w C .k 1/ n/ with length cvw , otherwise. (iii) Loop for in lines 13–17: the stage N is completed. At each iteration, for each node v 2 f1; : : : ; ng and for each adjacent node w 2 F S.v/, an arc .a; b/ is added to A0 connecting node a D v C .N 1/ n to node b D w C .N 1/ n and having length cvw . It is easy to see that jA0 j D N m and therefore the T computational complexity of SPTPReduction is O.N m/. Note that, since N kD1 Tk D ;, it results that N n, and therefore, the worst case computational complexity is O.n m/.

On Some Special Network Flow Problems: The Shortest Path Tour Problems

249

Fig. 2 Pseudo-code of a polynomial reduction algorithm

Figure 3 depicts the multistage graph G 0 corresponding to the SPTP instance on the small graph G of Fig. 1. Note that, jV 0 j D N n D 4 7 D 28, jA0 j D N m D 4 11 D 44, s D 1, d 0 D d C .N 1/ n D 7 C 3 7 D 28. We now claim that in G 0 , as constructed above, there is a path P 0 from s to d 0 of length K if and only if in G there is a path tour PT from s to d of length K. Suppose that in G 0 there is a path P 0 of length K from s to d 0 . Because P 0 connects s 2 T1 to d 0 2 TN , for each k D 1; : : : ; N 1 there must be in P 0 necessarily at least one arc connecting two nodes in consecutive stages k and k C 1. Therefore, it follows that P 0 consists of at least one node in each of the N stages, so corresponding to a path tour PT of length K in G that successively passes through at least one node from the given node subsets T1 ; T2 ; : : : ; TN . Conversely, suppose that in G there is a path tour PT of length K that successively passes through at least one node from the given node subsets T1 ; T2 ; : : : ; TN . Then, by construction, for each arc in PT connecting in G two nodes belonging to consecutive subsets, there exists in the simple path P 0 an arc connecting in G 0 two nodes belonging to consecutive stages, till finally moving to d 0 in the last stage N . t u

250

P. Festa

k=1

k=2

1

8

S 2

1

1

1

2 1

4

4 6 2

23 1 2

17

4

12

18

5

24 1

3

25

4 4

19

26

3

4

3 13

4 20

27 3

2 7

1

1

1 3

11

4

5

3

5

2

1 3

22 1

1 5

10 1

k=4

16

1

3

4

2

9 5

3

vk=v+(k-1)*n= k=3 1+(2-1)*7=8 15 1 1

14

21

2

2

28

d’

L(SP)=11 Fig. 3 The multistage graph G 0 corresponding to the SPTP instance on G of Fig. 1

2.1 Several Alternative Algorithms for the SPTP Several alternative techniques have been designed in [14] to exactly solve the SPTP as defined in Sect. 1. Once obtained in polynomial-time the multistage graph G 0 by applying the algorithm SPTPReduction, any shortest path algorithm can be applied to solve the resulting SPP. Classical SPPs are among the most studied combinatorial problems that arise as subproblems when solving many optimization problems. Exhaustive surveys of the most interesting and efficient shortest path algorithms, important for their computational time complexity or for their practical efficiency, can be found among others in [1, 7–12, 15, 16, 19]. Although the huge number of state-of-theart algorithms for the SPP, there does not exist a best method that outperforms all the others. In fact, recent research lines tend to develop techniques designed ad hoc for solving special structured SPPs: either a special network topology or a special cost structure. In [14], the following algorithms have been designed and tested: • A dynamic programming algorithm, as suggested in [3]. • A Dijkstra-like algorithm [13] that uses a binary heap to store the nodes with temporary labels.

On Some Special Network Flow Problems: The Shortest Path Tour Problems

251

• Several Auction-like algorithms [2, 4]: a forward, a backward, and a combined for/backward version. To describe the dynamic programming approach a slight different notation to represent an expanded graph G 0 D .V 0 ; A0 ; C 0 / has been used. For each node i 2 V , V 0 contains N C 1 nodes .i; 0/, .i; 1/, : : :, .i; N /. The meaning of being in node .i; k/, k D 1; 2; : : : ; N , is that we are at node i and have already successively visited the sets T1 ; : : : ; Tk , but not yet the sets TkC1 ; : : : ; TN . The meaning of being in node .i; 0/ is that we are at node i and have not yet visited any node in the set T1 . For each arc .i; j / 2 A and for each k D 0; 1; : : : ; N 1, we introduce in A0 an arc from .i; k/ to .j; k/, if j … TkC1 or an arc from .i; k/ to .j; k C 1/, if j 2 TkC1 . Moreover, for each arc .i; j / 2 A we introduce in A0 an arc from .i; N / to .j; N /. Once obtained the expanded graph G 0 , the SPTP is equivalent to find a shortest path from .s; 0/ to .d; N /. Let D rC1 .i; k/, k D 0; 1; : : : ; N , be the shortest distance from .i; k/ to the destination node .d; N / using r arcs or less. For k D 0; 1; : : : ; N 1 the DP iteration is the following: D

rC1

.i; k/ D min

D

rC1

min fcij C D .j; k/; min fcij C D .j; k C 1/g

.i; N / D

r

j 2TkC1

j …TkC1

.i;j /2A

(

r

min fcij C D r .j; N /g; if i 6D d I

.i;j /2A

if i D d :

0;

(3)

Initial conditions are the following: D .i; k/ D 0

1; if .i; k/ 6D .d; N /I 0; if .i; k/ D .d; N /:

In [14] it has been proved that the dynamic programming algorithm implementing the above DP iteration is correct and terminates in a finite number of iterations, as stated in the following theorem. Theorem 3. An algorithm implementing the above DP iteration terminates after a finite number of iterations with an optimal solution and its computational complexity is O.N 2 n m/, and O.n3 m/ in the worst case.

2.2 Experimental Results In this subsection, we report on some computational experiments carried in [14] to determine which algorithm among those proposed seems to be more effective to solve the classical SPTP.

252

P. Festa

The following algorithms have been designed and implemented: (a) (b) (c) (d) (e) (f) (g) (h)

Dijkstra forward with binary heap Standard Auction forward Standard Auction backward Combined for/backward Auction fb DP Dijkstra, DP with Dijkstra as initialization phase DP Auction, DP with Auction as initialization phase DP Auction back, DP with Auction backward as initialization phase DP Dijkstra back, DP with Dijkstra backward as initialization phase

Since the algorithm simply implementing DP iteration (3) was too time consuming, in [14] a slightly different variant was proposed that first calculates D.i; N / using a standard shortest path computation (DP Dijkstra, DP Auction, DP Dijkstra, DP Auction back, DP Dijkstra back). The objectives of the computational study were to compare the running times achieved by several alternative algorithms as a function of the parameter N when applied to solve SPTP instances pseudorandomly generated and characterized by several different network topologies, with different densities and number of nodes. The arc lengths have been pseudorandomly generated as integers in the range from 0 to 10000 and two nodes have been randomly chosen to be the source node s and the destination node d , respectively. Moreover, the following graph families have been considered: (1) complete graphs with n 2 f60; 100g; (2) square grids with n D 10 10 and rectangular grids with n D 25 6; (3) random graphs with n D 150 and m 2 f4 n; 8 ng. For each problem family, ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng and the mean time (in second) required to find an optimal solution has been stored and plotted in Figs. 4–9. Looking at the results obtained and analyzed in [14], Dijkstra’s algorithm outperforms all the competitors.

3 Several New Different Variants of the Classical SPTP In this section, several new different variants of the classical SPTP are stated and new results are presented about their reduction to special facility location problems.

3.1 A Special Non-metric Multilevel Uncapacitated Facility Location Problem In the 1-level uncapacitated facility location problem (1-UFLP), a set of clients and a set of facilities are given and the target is to find a subset of facilities to be opened such that all the clients are served by the open facilities while minimizing the total cost of opening facilities and serving clients. In the more general l-level

On Some Special Network Flow Problems: The Shortest Path Tour Problems

253

Complete graphs with n=60 0.3

0.25

Time (sec.)

0.2

0.15

0.1

0.05

0 5

10

15

20

25

30

35

40

45

N Fig. 4 Complete graphs with n D 60: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

uncapacitated facility location problem (l-UFLP), the demands must be routed among facilities in a hierarchical order, i.e., from the highest level (for example, the factories) down to the lowest (for example, the retailers), before reaching the clients. More formally, the l-UFLP can be stated as follows. Given • The set of clients D • l-level sets of sites F1 ; : : : ; Fl , i.e., Fk , k D 1; : : : ; l, is the set of sites where facilities S may be located on level k • F D lkD1 Fk • The cost fik > 0 of setting up facility at site ik 2 Fk , k D 1; : : : ; l • A function C W D [ F D [ F ! RC [ f0g that assigns a nonnegative cost cab 0 of connecting a; b 2 D [ F (the adjective non-metric stands because any assumptions are made on the connecting costs, such as symmetry and/or triangle inequality) each client j 2 D must be served by exactly one open path P D fi1 ; : : : ; il g 2 P D F1 Fl of l facilities with exactly one from each of the l-levels, where a path P is open if and only if every facility on P is open. The total service cost jP incurred by assigning a client j 2 D to an open path P D fi1 ; : : : ; il g 2 P is the

254

P. Festa Complete graphs with n=100

1.6 1.4 1.2

Time (sec.)

1 0.8 0.6 0.4 0.2 0 10

20

30

40

50

60

70

N

Fig. 5 Complete graphs with n D 100: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

total connection cost given by jP D

l1 X

cik ikC1 C cil j :

kD1

Given a l-UFLP instance < D [ F ; C; f ./ >, the objective is to open a subset of facilities such that each client is assigned to an open path and the total cost is minimized, i.e., to choose ; 6D Sk Fk , k D 1; : : : ; l such that X j 2D

min

P 2S1 Sl

jP C

l X X

fik :

kD1 ik 2Sk

is minimized. Let us now consider a special SPTP hereafter called SPTP-1 and defined as follows: Definition 4. The SPTP-1 consists of finding a shortest path from a given origin node s 2 V to a given destination node d 2 V in the graph G with the constraint

On Some Special Network Flow Problems: The Shortest Path Tour Problems

255

Square grid graphs with n=10x10 0.1 0.09 0.08

Time (sec.)

0.07 0.06 0.05 0.04 0.03 0.02 0.02

10

20

30

40

50

60

70

N Fig. 6 Square grids with n D 10 10: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

that the optimal path P should successively pass through Texactly and exclusively one node from given node subsets T1 ; T2 ; : : : ; TN , where N kD1 Tk D ;. As stated and proved in Theorem 4, the SPTP-1 is polynomially Karp-reducible to a special l-UFLP, where

jDj D 1 fik D 1 for each site ik 2 Fk , k D 1; : : : ; l

Let us call this special location problem l-UFLP. It holds the following result. p

Theorem 4. SPTP-1 <m l-UFLP. Proof. To prove the thesis, a polynomial-time reduction algorithm must be found that transforms any SPTP-1 instance into a l-UFLP instance and vice versa. Let us consider any SPTP-1 instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N >. It is easy to see that there exists a polynomial-time reduction algorithm that transforms it into the l-UFLP instance < D [ F ; C; f ./ >, where

256

P. Festa

Rectangular grid graphs with n=25 x 6 0.35

0.3

Time (sec.)

0.25

0.2

0.15

0.1

0.05

0 0

20

40

60

80

100

N Fig. 7 Rectangular grids with n D 25 6: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

• • • •

D D fd g. l D N 1. S 1 Fk D Tk for k D 2; : : : ; N 1, F1 D fsg, and F D N kD1 Fk . The connecting cost function C W D [ F D [ F ! RC [ f0g is the SPTP-1 length function C .

The SPTP-1 instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N > admits a solution path tour PT from s to d of length l.PT / if and only if l-UFLP instance < D [ F ; C; f ./ > admits a solution open path P D fi1 ; : : : ; iN 1 g 2 P D T1 TN 1 of N 1 facilities with exactly one from each of the N 1 levels and having connection cost dP D l.PT /. The total cost of the open path P D fi1 ; : : : ; iN 1 g is l.PT / C N 1. Conversely, there exists a polynomial-time reduction algorithm that transforms any l-UFLP instance < D [ F ; C; f ./ > into a SPTP-1 instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N >, where • V D D [ F [ fsg. • d D j 2 D (remind that jDj D 1, hence D D fj g).

On Some Special Network Flow Problems: The Shortest Path Tour Problems

257

Random graphs with n=150 and m=4 x n 0.2 0.18 0.16

Time (sec.)

0.14 0.12 0.1 0.08 0.06 0.04 0.02 0 10

20

30

40

50

60

70

80

90

100

110

N Fig. 8 Random graphs with n D 150 and m D 4 n: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

N D l C 2. T1 D fsg. Tk D Fk1 for k D 2; : : : ; l C 1 D N 1 and TN D D. The SPTP-1 length function C is the connecting cost function C W D [ F D [ F ! RC [ f0g. • A is made up of all arcs .a; b/ corresponding to a connection cost cab in l-UFLP. Moreover, for each v1 2 F1 an arc .s; v1 / is introduced in A with length csv1 D 0.

• • • •

The l-UFLP instance < D [ F ; C; f ./ > admits a solution open path P D fi1 ; : : : ; il g 2 P D F1 Fl of l facilities with exactly one from each of the l levels and having connection cost dP and total cost dP C l if and only if the SPTP-1 instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N > admits a solution path tour PT from s to d of length l.PT / D dP . t u Note that, if the connecting costs for the multilevel facility location and the arc lengths for the path tour problem satisfy the triangle inequality, it is straightforward to prove that the metric SPTP is equivalent to the metric l-UFLP. As special multilevel uncapacitated facility location problem, SPTP-1 can be formulated as the following integer linear programming problem.

258

P. Festa

Random graphs with n=150 and m=8 x n 0.35

0.3

Time (sec.)

0.25

0.2

0.15

0.1

0.05

0 10

20

30

40

50

60

70

80

90

100

110

N Fig. 9 Random graphs with n D 150 and m D 8 n: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

Introducing a Boolean decision variable xdP for each path P 2 P s.t. xdP D

1; if node d is the terminal node of the path tour P I 0; otherwise;

then, (SPTP-1) min

X

dP xdP

P2 P

s.t.

X

xdP 1

(5)

P2 P

xdP 2 f0; 1g; 8 P 2 P

(6)

Constraint (5) imposes that the destination node d is terminal node of at least one path tour.

On Some Special Network Flow Problems: The Shortest Path Tour Problems

259

3.2 The Weighted Metric SPTP (W-mSPTP) The weighted metric SPTP (W-mSPTP) can be stated as follows. Definition 5. Given a directed graph G D .V; A; C; W /, where W W V 7! RC is a function that assigns a positive weight wi to each node i 2 V , and the length function C assigns a nonnegative length cij to each arc .i; j / 2 A such that • cij D cj i , for each .i; j / 2 A (symmetry) • cij cih C chj , for each .i; j /; .i; h/; .h; j / 2 A (triangle inequality) then, the W-mSPTP consists of finding a minimal cost path (in terms of both total length and total weight of the involved nodes) from a given origin node s 2 V to a given destination node d 2 V in the graph G with the constraint that the optimal path P should successively T pass through at least one node from given node subsets T1 ; T2 ; : : : ; TN , where N kD1 Tk D ;. Formally, given a W-mUFLP instance < G D .V; A; C; W /; s; d; N; fTk gkD1;:::;N >, the objective is to find a path P D fi1 D s; : : : ; iN D d g 2 T1 TN from s 2 T1 to d 2 TN corresponding to the minimum total cost, i.e., to choose ; 6D Sk Tk , k D 1; : : : ; N such that min

P 2S1 Sk

.P / C

N X X

wik

kD1 ik 2Sk

P 1 is minimized, where .P / D N kD1 cik ikC1 . As stated in Theorem 5, the W-mSPTP is polynomially Karp-reducible to a special l-UFLP, where jDj D 1. Let us call this special location problem l-1-UFLP. It holds the following result: p

Theorem 5. W-mSPTP <m l-1-UFLP. Proof. To prove the thesis, a polynomial-time reduction algorithm must be found that transforms any W-mSPTP instance into a l-1-UFLP instance and vice versa. Once assimilated the setting up facility costs f ./ with the node weight function W ./, the polynomial reduction can be proved following similar reasonings as for the claim of Theorem 4. The proof is completed by observing that the l-1-UFLP instance < D [ F ; C; f ./ > admits a solution open path P D fi1 ; : : : ; il g 2 P D F1 Fl of l facilities with exactly one from each of the l levels and having connection cost dP and total cost dP C

l X X kD1 ik 2Sk

fik

260

P. Festa

if and only if the W-mSPTP instance < G D .V; A; C; W /; s; d; N; fTk gkD1;:::;N > admits a solution P from s to d of length l.P / D .P / D dP and total cost given by N X X wik : dP C

t u

kD1 ik 2Sk

3.3 The Weighted Metric 1-q-SPTP (W-1-q-mSPTP) Let us consider a further variant of the problem: the weighted metric 1-q-SPTP (W1-q-mSPTP) stated as follows: Definition 6. Given a directed graph G D .V; A; C; W /, where W W V 7! RC is a function that assigns a positive weight wi to each node i 2 V , and the length function C assigns a nonnegative length cij to each arc .i; j / 2 A such that • cij D cj i , for each .i; j / 2 A (symmetry) • cij cih C chj , for each .i; j /; .i; h/; .h; j / 2 A (triangle inequality) then, the W-1-q-mSPTP consists of finding a minimal cost path (in terms of both total length and total weight of the involved nodes) from a given origin node s 2 V to each destination node dr 2 D TN in the graph G with the constraint that each corresponding optimal path Pdr should successively pass through at least one node T from given node subsets T1 ; T2 ; : : : ; TN , where N kD1 Tk D ;. Formally, given a W-1-q-mUFLP instance < G D .V; A; C; W /; s; D; N; fTk gkD1;:::;N >; the objective is to find for each dr 2 D a path Pdr D fi1 D s; : : : ; iN D dr g 2 T1 TN from s 2 T1 to dr corresponding to the minimum total cost, i.e., to choose ; 6D Sk Tk , k D 1; : : : ; N such that X dr 2D

min

Pr 2S1 Sl

.Pr / C

N X X

wik :

kD1 ik 2Sk

is minimized. Theorem 6 claims that the W-1-q-mUFLP is polynomially Karp-reducible to the classical (metric) multilevel uncapacitated facility location problem (l-UFLP). p

Theorem 6. W-1-q-mUFLP <m l-UFLP. Proof. To prove the thesis, a polynomial-time reduction algorithm must be found that transforms any W-1-q-mUFLP instance into a l-UFLP instance and vice versa.

On Some Special Network Flow Problems: The Shortest Path Tour Problems

261

Once assimilated the setting up facility costs f ./ with the node weight function W ./ and the set of clients D with the set of destinations D, the polynomial reduction can be proved following similar reasonings as for the claim of Theorems 4 and 5. The proof is completed by observing that the l-UFLP instance admits a solution made of jDj open paths Pj D fi1 ; : : : ; il g 2 P D F1 Fl (j D 1; : : : ; jDj)Pof l facilities with exactly one from each of the l levels and having connection cost j 2D jP and total cost X

jP C

j 2D

l X X

fik

kD1 ik 2Sk

if and only if the W-1-q-mUFLP instance < G D .V; A; C; W /; s; D; N; fTk gkD1;:::;N > admits a solution made of jDj paths Pr from s to dr 2 D (r D 1; : : : ; jDj). Each path Pr has l.Pr / D .Pr / D dr P and the total cost of the solution is given by X

dr P C

N X X

t u

wik :

kD1 ik 2Sk

dr 2D

A consequence of Theorem 6 is that W-1-q-mUFLP can be formulated as the following linear programming problem. jT j Let be T D [N s.t. kD1 Tk and let us define a Boolean decision vector y 2 f0; 1g 8 ik 2 Tk , k D 1; : : : ; N yik D

1; if node ik is in Pr for some r 2 f1; : : : ; jDjgI 0; otherwise:

Introducing a Boolean decision variable xdr P for each path P 2 P and each destination node dr 2 D s.t. xdr P D

1; if node dr is the terminal node of Pr I 0; otherwise;

then, (W-1-q-mUFLP) min

X X

dr P xdr P C

P 2 P dr 2D

s.t.

X P2P

xdr P D 1;

N X

wik yik

kD1

8 dr 2 D;

(7)

262

P. Festa

X

xdr P yik 0;

8 dr 2 D;

P 2PW ik 2P

8 i k 2 Tk ;

(8)

k D 1; : : : ; N; xdr P 2 f0; 1g;

8 P 2 P;

(9)

8 dr 2 D; yik 2 f0; 1g;

8 i k 2 Tk ; k D 1; : : : ; N:

(10)

Constraint (7) imposes that each destination node dr is terminal node of at least one path. Constraints (8) guarantee that each destination dr cannot be terminal node of a path P unless P passes through node ik . In fact, if yik D 0, then the sum of all assignment variables for node dr to use paths containing ik must also be 0. Note that the combination of constraints (7) and (9) allows to relax constraints (9) that can be replaced by xdr P 0; 8 P 2 P; 8 dr 2 D. Similarly, constraints (10) can be replaced by yik 0; 8 ik 2 Tk ; k D 1; : : : ; N , since the sum in constraints (8) is bounded from above by the sum in constraints (7) and wi > 0, for each i 2 V .

4 Conclusions and Future Directions This paper studies the SPTPs, special network flow problems recently proposed in the literature that have originated from applications in combinatorial optimization problems with precedence constraints to be satisfied. In [14], the classical and simplest version of the problem has been proved to be polynomially solvable since it reduces to a special single source–single destination SPP. In that paper, several alternative exact algorithms have been proposed and the results of an extensive computational experience are reported to demonstrate empirically which algorithms result more efficient in finding an optimal solution to several different problem instances. Looking at the results, Dijkstra’s algorithm outperforms all the competitors. Nevertheless, further experiments would be needed on a wider set of instances and further investigation is planned in the next future in order to implement and test a collection of different algorithms that • Use path length upper bounds [4] • Mix Auction and graph collapsing [5] and virtual sources [6] ideas • Use the structure of the SPTP and/or the structure of the expanded graph In this paper, several different variants of the classical SPTP have been stated and formally described as special facility location problems. This relationship between

On Some Special Network Flow Problems: The Shortest Path Tour Problems

263

the two families of problems suggests that the SPTPs could be a powerful tool usable to attack the location problems. It appears that much work could be done along this direction, both with regard to approximation and exact algorithms for location problems. In addition, thinking to future research it would be also interesting T to study some further variants of the SPTP and their complexity where the constraint N kD1 Tk D ; is relaxed and/or arc capacity constraints are added.

References 1. Ahuja, R.K., Magnanti, T.L., Orlin, J.B.: Network Flows: Theory, Algorithms and Applications. Prentice-Hall Englewood Cliffs (1993) 2. Bertsekas, D.P.: An auction algorithm for shortest paths. SIAM J. Optim. 1, 425–447 (1991) 3. Bertsekas, D.P.: Dynamic Programming and Optimal Control. 3rd Edition, Vol. I. Athena Scientific (2005) 4. Bertsekas, D.P., Pallottino, S., Scutell`a, M.G.: Polynomial auction algorithms for shortest paths. Comput. Optim. Appl. 4, 99–125 (1995) 5. Cerulli, R., Festa, P., Raiconi, G.: Graph collapsing in shortest path auction algorithms. Comput. Optim. Appl. 18, 199–220 (2001) 6. Cerulli, R., Festa, P., Raiconi, G.: Shortest path auction algorithm without contractions using virtual source concept. Comput. Optim. Appl. 26(2), 191–208 (2003) 7. Cherkassky, B.V., Goldberg, A.V.: Negative-cycle detection algorithms. Math. Prog. 85, 277–311 (1999) 8. Cherkassky, B.V., Goldberg, A.V., Radzik, T.: Shortest path algorithms: theory and experimental evaluation. Math. Prog. 73, 129–174 (1996) 9. Cherkassky, B.V., Goldberg, A.V., Silverstein, C.: Buckets, heaps, lists, and monotone priority queues. SIAM J. Comput. 28, 1326–1346 (1999) 10. Denardo, E.V., Fox B.L.: Shortest route methods: 2. group knapsacks, expanded networks, and branch-and-bound. Oper. Res. 27, 548–566 (1979) 11. Denardo, E.V., Fox, B.L.: Shortest route methods: reaching pruning, and buckets. Oper. Res. 27, 161–186 (1979) 12. Deo, N., Pang, C.: Shortest path algorithms: taxonomy and annotation. Networks 14, 275–323 (1984) 13. Dijkstra E.: A note on two problems in connexion with graphs. Numer. Math. 1, 269–271 (1959) 14. Festa, P.: Complexity analysis and optimization of the shortest path tour problem. Optim. Lett.(to appear) 1–13 (2011). doi: 10.1007/s11590-010-0258-y 15. Gallo, G., Pallottino, S.: Shortest path methods: a unified approach. Math. Prog. Study. 26, 38–64 (1986) 16. Gallo, G., Pallottino, S.: Shortest path methods. Ann. Oper. Res. 7, 3–79 (1988) 17. Karp, R.M.: Reducibility among combinatorial problems. In: Miller, R.E., Thatcher, J.W. (eds.) Complexity of Computer Computations. Plenum Press (1972) 18. Papadimitriou, C.H., Steiglitz, K.: Combinatorial optimization: Algorithms and complexity. Prentice-Hall (1982) 19. Shier, D.R., Witzgall, C.: Properties of labeling methods for determining shortest path trees. J. Res. Nat. Bur. Stand. 86, 317–330 (1981)

Part III

Game Theory and Cooperative Control Foundations for Dynamics of Information Systems

A Hierarchical MultiModal Hybrid Stackelberg–Nash GA for a Leader with Multiple Followers Game Egidio D’Amato, Elia Daniele, Lina Mallozzi, Giovanni Petrone, and Simone Tancredi

Abstract In this paper a numerical procedure based on a genetic algorithm (GA) evolution process is given to compute a Stackelberg solution for a hierarchical nC1-person game. There is a leader player who enounces a decision before the others, and the rest of players (followers) take into account this decision and solve a Nash equilibrium problem. So there is a two-level game between the leader and the followers, called Stackelberg–Nash problem. The idea of the Stackelberg-GA is to bring together genetic algorithms and Stackelberg strategy in order to process a genetic algorithm to build the Stackelberg strategy. In the lower level, the followers make their decisions simultaneously at each step of the evolutionary process, playing a so called Nash game between themselves. The use of a multimodal genetic algorithm allows to find multiple Stackelberg strategies at the upper level. In this model the uniqueness of the Nash equilibrium at the lower-level problem has been supposed. The algorithm convergence is illustrated by means of several test cases.

E. D’Amato Dipartimento di Scienze Applicate, Universit`a degli Studi di Napoli “Parthenope”, Centro Direzionale di Napoli, Isola C 4 - 80143 Napoli, Italy e-mail: egi[email protected] E. Daniele • S. Tancredi Dipartimento di Ingegneria Aerospaziale, Universit`a degli Studi di Napoli “Federico II”, Via Claudio 21 - 80125 Napoli, Italy e-mail: [email protected]; [email protected] G. Petrone Mechanical Engineering and Institute for Computational Mathematical Engineering Building 500, Stanford University. Stanford, CA 94305-3035 e-mail: [email protected] L. Mallozzi () Dipartimento di Matematica e Applicazioni, Universit`a degli Studi di Napoli “Federico II”, Via Claudio 21 - 80125 Napoli, Italy e-mail: [email protected] 267 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 14, © Springer Science+Business Media New York 2012

268

Keywords Genetic algorithm • Hierarchical • Stackelberg strategy

E. D’Amato et al.

game • Nash

equilibrium

1 Introduction The idea to use genetic algorithms to compute solutions to problems arising in Game Theory can be found in different papers [7, 13, 15, 16]. More precisely, in [15] the authors solve a Stackelberg problem with one leader and one follower (leader– follower model) by using genetic algorithm; in [13] the authors solve with GA a Nash equilibrium problem, the well known solution concept in Game Theory for a n players noncooperative game. Both types of solutions are considered in a special aerodynamics problem by [16]. A more general case, dealing with one leader and multiple followers, is the socalled Stackelberg–Nash problem, largely used in different applicative contexts as Transportation or Oligopoly Theory. The paper by [7] designs a genetic algorithm for solving Stackelberg–Nash equilibrium of nonlinear multilevel programming with multiple followers. In this paper, we deal with a general Stackelberg–Nash problem and assume the uniqueness of the Nash equilibrium solution of the follower players. We present a genetic algorithm suitable to handle multiple solutions for the leader by using multimodal optimization tools. In the first stage one of the players, called the leader, chooses an optimal strategy knowing that, at the second stage, the other players react by playing a noncooperative game which admits one Nash equilibrium, while a multiple Stackelberg solution may be managed at upper level. In the same spirit of [15], the followers’ best reply is computed at each step. For any individual of the leader’s population, in our case, multiple followers compute a Nash equilibrium solution, by using a genetic algorithm based on the classical adjustment process [5]. Then, the best reply Nash equilibrium—supposed to be unique—is given to the leader and an optimization problem is solved. We consider also the possibility that the leader may have more than one optimal solution, so that the multimodal approach based on the sharing function let us to reach all this possible solutions in the hierarchical process. A step by step procedure for optimization based on genetic algorithms (GA) has been implemented starting from a simple Nash equilibrium, through a Stackelberg solution, up to a hierarchical Stackelberg–Nash game, validated by different test cases, even in comparison with other researchers proposals [15, 16]. A GA is presented for a Nash equilibrium problem in Sect. 2 and for a Stackelberg–Nash problem in Sect. 3, together with test cases. Then some applications of the real life are indicated in the concluding Sect. 4.

A Hierarchical MultiModal Hybrid Stackelberg–Nash GA

269

1.1 The Stackelberg–Nash Model Let us consider an n+1 player game, where one player P0 is the leader and the rest of them P1 ; : : : ; Pn are followers in a two-level Stackelberg game. Let X; Y1 ; : : : ; Yn be compact, nonempty, and convex subsets of an Euclidean space that are the leader’s and the followers’ strategy sets, respectively. Let l; f1 ; : : : ; fn be real-valued functions defined on X Y1 Yn representing the leader’s and the followers’ cost functions. We also assume that l; f1 ; : : : ; fn are continuous in .x; y1 ; : : : ; yn / 2 X Y1 Yn and that fi is strictly convex in yi for any i D 1; : : : ; n. We assume that players are cost minimizers. The leader is assumed to announce his strategy x 2 X in advance and commit himself to it. For a given x 2 X the followers select .y1 ; : : : ; yn / 2 R.x/ where R.x/ is the set of the Nash equilibria of the n-person game with players P1 ; : : : ; Pn , strategy sets Y1 ; : : : ; Yn and cost functions f1 ; : : : ; fn . In the Nash equilibrium solution concept, it is assumed that each player knows the equilibrium strategies of the other players and no player has anything to gain by changing only his own strategy unilaterally [1]. For each x 2 X , which is the leader’s decision, the followers solve the following lower-level Nash equilibrium problem N .x/: 8 ˆ find .yN1 ; : : : ; yNn / 2 Y1 Yn such that ˆ ˆ ˆ ˆ ˆ f1 .uk1 ; vki /; fitness1 D 1 < if f1 .uki ; vk1 / < f1 .uk1 ; vki /; fitness1 D 1: ˆ ˆ :if f .uk ; vk1 / D f .uk1 ; vk /; fitness D 0 1 i 1 1 i

Similarly, for player 2: 8 k k1 k1 k ˆ ˆ f2 .uk1 ; vki /; fitness2 D 1: ˆ ˆ :if f .uk ; vk1 / D f .uk1 ; vk /; fitness D 0 2 i 2 2 i In this way a simple sorting criterion could be established. For equal fitness value individual are sorted on objective function f1 for population 1 (player 1) and on objective function f2 for player 2. 3. A mating pool for parent chromosome is generated and common GA techniques as crossover and mutation are performed on each player population. A second sorting procedure is needed after this evolution process. 4. At the end of kth generation optimization procedure player 1 communicates his own best value uk to player 2 who will use it at generation k C 1 to generate its entire chromosome with a unique value for its first part, i.e., the one depending on player 1, while on the second part comes from common GAs crossover and mutation procedure. Conversely, player 2 communicates its own best value vk to player 1 who will use it at generation kC1, generating a population with a unique value for the second part of chromosome, i.e., the one depending on player 2;

A Hierarchical MultiModal Hybrid Stackelberg–Nash GA Table 1 GA details

273

Parameter

Value

Population size [-] Crossover fraction [-] Mutation fraction [-] Parent sorting Mating pool [%] Elitism Crossover mode Mutation mode dmin for multimodal [-]

50 0.90 0.10 Tournament between couples 50 No Simulated Binary Crossover (SBX) Polynomial 0.2

5. A Nash equilibrium is found when a terminal period limit is reached, after repeating the steps 2–4. This kind of structure for the algorithm is similar to those used by other researchers, with a major emphasis on fitness function consistency [16].

2.2 Test Case In this test case and also in all the subsequent ones the characteristics the of GAs algorithm are summarized in Table 1. For the algorithm validation we consider the following example presented in [16]: the strategy sets are Y1 D Y2 D Œ5; 5 and f1 .y1 ; y2 / D .y1 1/2 C .y1 y2 /2 f2 .y1 ; y2 / D .y2 3/2 C .y1 y2 /2 for which the analytical solution is y1 N D

5 7 ; y2 N D : 3 3

By using the proposed algorithm our numerical results are yO1N D 1:6665; yO 2N D 2:3332:

274

E. D’Amato et al.

3 Hierarchical Stackelberg–Nash Genetic Algorithm 3.1 Stackelberg Genetic Algorithm Here the algorithm is presented for a two-player leader–follower game or Stackelberg game. Let X; Y be compact subsets of metric spaces that are the players’ strategy sets. Let l; f be two real-valued functions defined on X Y representing the players’ cost functions [15]. For any x 2 X leader’s strategy, the follower solves the problem 8 0, .P/

˘ ˘P .P/ D 2a˘ .P/ C 2 C ; ˘ .P/ .0/ D 1; ˛ ˘ .E/ ˘ .E/ ˘P .E/ D 2a˘ .E/ C 2 .P/ C ; ˘ .E/ .0/ D 1; 0 t T; ˘ ˛ must be solved. In general, nonzero-sum differential games are harder to solve than their zero-sum counterpart.

4 Open-Loop Nash Equilibrium in Nonzero-Sum Differential Games We now address the solution of the nonzero-sum differential game (1)–(3) using open-loop P and E strategies u.tI x0 / and v.tI x0 /, respectively: the information available to the P and E players is the initial state information only, x0 . A NE is sought where the NE strategies of players P and E are the respective controls u .tI x0 / and v .tI x0 /, 0 t T . The PMM applies. We form the Hamiltonians H .P/ .t; x; u; .P/ / D L.P/ .t; x; u; v .tI x0 // C ..P/ /T f .t; x; u; v .tI x0 //

(37)

The Role of Information in Nonzero-Sum Differential Games

291

and H .E/ .t; x; v; .E/ / D L.E/ .t; x; u .tI x0 /; v/ C ..E/ /T f .t; x; u .tI x0 /; v/ (38) A necessary condition for the existence of a NE in open-loop strategies entails the existence of nonvanishing costates .P/ .t/ and .E/ .t/, 0 t T , which satisfy the differential equations d.P/ .P/ D Hx.P/ ; .P/ .T / D QF x.T / dt

(39)

d.E/ .E/ D Hx.E/ ; .E/ .T / D QF x.T / dt

(40)

and

According to the PMM, a static nonzero-sum game with the P and E players’ respective costs (37) and (38) is solved 8 0 t T . The optimal control of P is given by the solution of the equation in u, @H .P/ .t; x; u; .P/ / D 0; @u

(41)

Q x; .P/ I v .tI x0 // u .t/ D .t;

(42)

that is,

The optimal control of E is given by the solution of the equation in v, @H .E/ .t; x; v; .E/ / D 0; @v

(43)

v .t/ D Q .t; x; .E/ I u .tI x0 //I

(44)

that is

The functions Q and Q are known and, in principle, one can solve the set of two equations in u and v , (42) and (44). One obtains the “control laws” u D .t; x; .P/ ; .E/ /

(45)

v D

(46)

and .t; x; .P/ ; .E/ /

In (45) and (46) the functions and are known. In the static game the P and E players’ cost functions H .P/ and H .E/ were parametrized by .P/ and .E/ , respectively. Hence, the solutions (45) and (46) of

292

M. Pachter and K. Pham

the static Nash game are also parametrized by .P/ and .E/ . That is why we have used quotation marks to emphasize that (45) and (46) should not be considered control laws/strategies, because the costates .P/ and .E/ are not yet determined. The optimal “control laws” (45) and (46) are inserted into (1), yielding the optimal trajectory dx D f .t; x ; .t; x ; .P/ ; .E/ /; .t; x ; .P/ ; .E/ //; x.0/ D x0 ; 0 t T dt (47) The open-loop Nash equilibrium is found upon solving the TPBVP (39), (40), and (47) using (45) and (46).

5 Nonzero-Sum LQ Games: Open-Loop Control The theory developed in Sect. 4 is now applied to the solution of the open-loop nonzero-sum LQ differential game (16)–(18). The Hamiltonians are H .P/ .t; x; u; .P/ / D x T Q.P/ x C uT R.P/ uC..P/ /T .AxCBuCC v .tI x0 //

(48)

and H .E/ .t; x; v; .E/ / D x T Q.E/ xCvT R.E/vC..E/ /T .AxCBu .tI x0 /CC v/

(49)

Consequently, the functions .t; x; .P/ ; .E/ / D 12 .R.P/ /1 B T .P/ ;

(50)

.t; x; .P/ ; .E/ / D 12 .R.E/ /1 C T .E/

(51)

Using (39), (40), and (47) we obtain the linear TPBVP (52)–(54): d.P/ dt d.E/ dt

.P/

D AT .P/ 2Q.P/ x ; .P/ .T / D QF x.T / .E/

D AT .E/ 2Q.E/x ; .E/ .T / D QF x.T /

(52) (53)

The Role of Information in Nonzero-Sum Differential Games

293

and 1 dx 1 B T .P/ CC.R.E/ /1 C T .E/ ; x.0/ D x0 ; 0 t T D Ax B R.P/ dt 2 (54)

In order to avoid the need to solve the TPBVP, proceed as follows. Claim B The costate .P/ .t/ D 2P .P/ .t/ x .tI x0 /

(55)

.E/ .t/ D 2P .E/ .t/ x .tI x0 /;

(56)

and the costate

where P .P/ .t/ and P .E/ .t/ are real, symmetric n n matrices 8 0 t T . Inserting (55) and (56) into (52)–(54) yields as set of two coupled Riccati type matrix differential equations dP .P/ D AT P .P/ P .P/ A Q.P/ C P .P/ B.R.P/ /1 B T P .P/ dt i 1 T .E/ 1 1h .P/ C P P / C R.E/ C P C P .E/ C T R.E/ CP .P/ ; P P .T / D QF 2

and dP .E/ D AT P .E/ P .E/ A Q.E/ C P .E/ C.R.E/ /1 C T P .E/ dt 1 1 .E/ C P .E/ B.R.P/ /1 B T P .P/ C P .P/ B T R.P/ BP .E/ ; P E .T / D QF 2

Once P .P/ .t/ and P .E/ .t/ have been calculated, the open-loop NE strategy of P is explicitly given by 1 u .tI x0 / D .R.P/ /1 B T P .P/ .t/ x .t/ 2 and the open-loop NE strategy of E is explicitly given by 1 v .tI x0 / D .R.E/ /1 C T P .E/ .t/ x .t/I 2

294

M. Pachter and K. Pham

the optimal trajectory x .t/ is given by the solution of the linear differential equation

1 dx D A B.R.P/ /1 B T P .P/ C C.R.E/ /1 C T P .E/ x ; dt 2 x .0/ D x0 ; 0 t T The above obtained result is summarized in Theorem 2. A (unique) solution to the open-loop nonzero-sum LQ differential game (16)–(18) exists 8 x0 2 Rn iff a solution on the interval 0 t T of the two coupled Riccati-type matrix differential equations dP .P/ D AT P .P/ C P .P/ A P .P/ B.R.P/ /1 B T P .P/ C Q.P/ dt 1 1 1 .P/ P .P/ C R.E/ C T P .E/ C P .E/ C T R.E/ CP .P/ ; P P .0/ D QF 2 (57)

and dP .E/ D AT P .E/ C P .E/ A C Q.E/ P .E/ C.R.E/ /1 C T P .E/ dt 1 1 1 .E/ P .E/ B R.P/ B T P .P/ C P .P/ B T R.P/ BP .E/ ; P E .T / D QF 2 (58)

exists. The open-loop NE strategy of P is 1 u .tI x0 / D .R.P/ /1 B T P .P/ .T t/ x .t/ 2

(59)

and the open-loop NE strategy of E is 1 v .tI x0 / D .R.E/ /1 C T P .E/ .T t/ x .t/; 2

(60)

where x .t/, the optimal trajectory, is given by the solution of the linear differential equation 1 dx .P/ 1 T .P/ .E/ 1 T .E/ D A ŒB.R / B P .T t/ C C.R / C P .T t/ x ; dt 2 x .0/ D x0 ; 0 t T

(61)

Finally, the respective values of P and E are V .P/ .x0 / D x0T P .P/ .T /x0

(62)

The Role of Information in Nonzero-Sum Differential Games

295

and V .E/ .x0 / D x0T P .E/ .T /x0

(63)

Evidently, the solution of the open-loop nonzero-sum LQ differential game hinges on the solution of the set of Riccati equations (57) and (58) on the interval 0 t T . A solution always exists for T sufficiently small.

5.1 Discussion It is remarkable that also the solution of the open-loop LQ differential game hinges on the existence of a solution to a system of Riccati equations. However, the solutions P .P/ .t/ and P .E/ .t/ of Riccati differential equations (57) and (58) which pertain to the case where the players P and E both play open-loop are not the same as the solutions of Riccati differential equations (27) and (28) which pertain to the case where the players P and E both use closed-loop strategies. Thus, we denote the .P/ .E/ solution of the system of Riccati equations (27) and (28) by PC C .t/, and PC C .t/, .P/ and the solution of the system of Riccati equations (57) and (58) by POO .t/ and .E/ POO .t/. These determine the values of the respective closed-loop and open-loop nonzero-sum differential games. Since Riccati equations (57) and (58) are not identical to Riccati equations (27) and (28), the open-loop values are different from the values obtained when feedback strategies are used. Indeed, consider the scalar minimum energy nonzerosum differential game discussed in Sect. 3.1. In the scalar closed-loop game the Riccati equations, (27) and (28), are b 2 .P/ 2 c 2 .P/ .E/ .P/ .P/ .P/ .P/ PPC C D 2aPC C .P/ PC C 2 .E/ PC C PC C ; PC C .0/ D qF r r c 2 .E/ 2 b 2 .P/ .E/ .E/ .E/ .E/ .E/ PPC C D 2aPC C .E/ PC C 2 .P/ PC C PC C ; PC C .0/ D qF ; 0 t T r r We “integrate” the differential system and we calculate b 2 .P/ 2 c 2 .P/ .E/ .P/ .P/ .P/ PC C .T / D qF C 2aqF .P/ qF C 2 .E/ qF qF T r r c 2 .E/ 2 b 2 .P/ .E/ .E/ .E/ .E/ PC C .T / D qF C 2aqF C .E/ qF 2 .P/ qF qF T r r

296

M. Pachter and K. Pham

In the scalar open-loop game Riccati equations, (57) and (58), are b 2 .P/ 2 c 2 .P/ .E/ .P/ .P/ .P/ .P/ PPOO D 2aPOO .P/ POO .E/ POO POO ; POO .0/ D qF r r c 2 .E/ 2 b 2 .P/ .E/ .E/ .E/ .E/ .E/ PPOO D 2aPOO .E/ POO .P/ POO POO ; POO .0/ D qF ; 0 t T r r We “integrate” the differential system and we calculate b 2 .P/ 2 c 2 .P/ .E/ .P/ .P/ .P/ C .E/ qF qF T POO .T / D qF C 2aqF .P/ qF r r 2 2 c b 2 .P/ .E/ .E/ .E/ .E/ .E/ POO .T / D qF C 2aqF C .E/ qF .P/ qF qF T r r From the above calculations we conclude .P/

.P/

.E/

.E/

POO .T / < PC C .T / and POO .T / < PC C .T / In summary, we have Proposition 2. In the scalar nonzero-sum LQ differential game and for T sufficiently small, the players’ values satisfy .P/

.P/

.E/

.E/

POO .t/ < PC C .t/ and POO .t/ < PC C .t/ 8 0 t T. It goes without saying that the range of the game horizon T s.t. Proposition 4 .P/ .E/ holds depends on the problem parameters a, b, c, qF , qF , r .P/ , and r .E/ . .P/

.E/

Example 1. Scalar nonzero-sum differential game. The solutions PC C and PC C of .P/ .E/ Riccati equations (27) and (28) are compared to the solutions POO and POO of Riccati equations (57) and (58). .P/ .E/ The parameters are qF D qF D 1, r .P/ D 12 , r .E/ D 1, b D c D 1, and a D 1. The values of the game when the initial state j x0 jD 1 are shown in Fig. 1. The E-player is always better off when open-loop strategies are employed and the P-player is better off when open-loop strategies are employed, provided that the game horizon T < 0:4258.

The Role of Information in Nonzero-Sum Differential Games

297

When the dynamics parameter a D 1, both players are better off playing openloop, irrespective of the length of the game horizon T —see, e.g., Fig. 2. Not only does the open-loop solution not yield the solution to the closed-loop differential game, as is the case in optimal control and zero-sum differential games, but also, in addition, both players are better off using open-loop strategies as if only the initial state information x0 were available to them. Indeed, it is most interesting that both players’ open-loop values are lower than their respective closed-loop values: having access to the current state information does no good to the players.

6 Open-Loop vs. Closed-Loop Play in LQ Differential Games Since in nonzero-sum differential games the open-loop solution ¤ closed-loop solution, it is interesting to also consider nonzero-sum differential games with an asymmetric information pattern where P uses a closed-loop strategy against player E who is committed to an open-loop strategy v.tI x0 /, 0 t T , and vice versa. We consider the nonzero-sum LQ differential game (16)–(18) where P uses state feedback whereas E plays open-loop. In this case player P uses DP against E’s control v.t/, 0 t T , whereas player E applies the PMM against P’s state feedback strategy u.t; x/. Hence, the respective Hamiltonians of players P and E are as follows. P’s Hamiltonian H .P/ .t; x; u; / D x T Q.P/ x C uT R.P/ u C T ŒAx C Bu C C v.t/; where Vx.P/ Consequently, the optimal “control law” is 1 u.t; x; Vx.P/ / D .R.P/ /1 B T Vx.P/ 2 E’s Hamiltonian H .E/ .t; x; v; / D x T Q.P/ x vT R.E/ v C T ŒAx C Bu C C v.t/; and consequently the optimal “control law” is v.t; x; / D Thus, the following holds.

1 .E/ 1 T .R / C 2

298

M. Pachter and K. Pham

2

pccp pcce poop pooe

T: 0.4258 P: 1.403

1.5 1 0.5 0 −0.5 −1 −1.5 −2

0

0.5

1

1.5

2

2.5

3

Fig. 1 Open-loop values < closed-loop values

1 pccp pcce poop pooe

0.8 0.6 0.4 0.2 0 −0.2 −0.4 −0.6 −0.8 −1

0

0.5

1

1.5

2

2.5

Fig. 2 Open-loop values < closed-loop values 8 T > 0

3

3.5

4

4.5

5

The Role of Information in Nonzero-Sum Differential Games

299

Applying the method of DP we obtain the PDE

@V .P/ 1 D x T Q.P/ x C x T AT Vx.P/ .Vx.P/ /T B.R.P/ /1 B T Vx.P/ @t 4 1 .P/ T .P/ C .Vx / C.R.E//1 C T ; Vx.P/ .T; x/ D x T QF x 8 x 2 Rn (64) 2

Applying the PMM we obtain the costate equation

d @u.t; x/ T .E/ T .E/ T D A 2Q x B ; .T / D 2QF x.T / dt @x Now 1 u.t; x/ D .R.P/ /1 B T Vx.P/ .t; x/ 2 so that 1 @u.t; x/ .P/ D .R.P/ /1 B T Vxx @x 2 and therefore 1 .P/ d D AT 2Q.E/x AT x C Vxx .t; x/B.R.P/ /1 B T ; dt 2 .E/

.T / D 2QF x.T /

(65)

Finally, the state evolves according to 1 dx 1 D Ax B.R.P/ /1 B T Vx.P/ .t; x/ C C.R.E/ /1 C T ; x.0/ D x0 dt 2 2

(66)

We must solve the above boundary value problem which entails a system of three equations—the PDE (64) and the two ODEs (65) and (66). We shall require Claim C V .P/ .t; x/ D x T P .P/ .t/x; 0 t T;

(67)

where P .P/ .t/ is a real, symmetric matrix, 0 t T . Inserting the expression (67) for V .P/ .t; x/ into (64) and symmetrizing yield x T PP .P/ x D x T AT P .P/ xCx T P .P/ Ax x T P .P/ B.R.P/ /1 B T P .P/ xCx T Q.P/ x 1 1 C x T P .P/ C.R.E/ /1 C T C T C.R.E//1 C T P .P/ x ; 2 2 .P/

P .P/ .T / D QF

(68)

300

M. Pachter and K. Pham

and inserting the expression (67) for V .P/ .t; x/ into (65) and (66) yields .E/ P D AT 2Q.E/x C P .P/ B.R.P/ /1 B T ; .T / D 2QF x.T /

(69)

1 xP D Ax B.R.P/ /1 B T P .P/ x C C.R.E//1 C T ; x.0/ D x0 2

(70)

and

We shall also require Claim D .t/ D 2P .E/ .t/x;

(71)

where P .E/ .t/ is a real, symmetric matrix, 0 t T . Inserting the expression (71) for .t/ into (68) yields PP .P/ D AT P .P/ C P .P/ A P .P/ B.R.P/ /1 B T P .P/ C Q.P/ .P/

P .P/ C.R.E/ /1 C T P .E/ P .E/ C.R.E//1 C T P .P/ x; P .P/ .T / D QF

(72) Furthermore, differentiation of (71) yields P D 2PP .E/ x C 2P .E/ xP

(73)

Inserting (70) into (72) and using Ansatz E yield 1 P D 2PP .E/ x C 2P .E/ Ax B.R.P/ /1 B T P .P/ x C C.R.E//1 C T 2

D 2PP .E/ x C 2P .E/ Ax B.R.P/ /1 B T P .P/ x C.R.E/ /1 C T P .E/ x

(74)

Next, inserting the expression (74) for P into (69) and reusing Ansatz E yield PP .E/ D AT P .E/ C P .E/ A P .E/ C.R.E/ /1 C T P .E/ Q.E/ .E/

P .E/ B.R.P/ /1 B T P .P/ P .P/ B.R.P/ /1 B T P .E/ ; P .E/ .T / D QF (75) We have obtained a system of coupled Riccati equations, (72) and (75), which is identical to (27) and (28). The solution of the system of Riccati equations (27) and (28) yields the optimal strategies u .t; x/ D .R.P/ /1 B T P .P/ .t/x

The Role of Information in Nonzero-Sum Differential Games

301

and v .tI x0 / D .R.E/ /1 C T P .E/ .t/x .t/ Having obtained the solution of Riccati systems (27) and (28), the optimal trajectory x .t/ is given by the solution of the linear differential equation

xP D A B.R.P/ /1 B T P .P/ .t/ C C.R.E/ /1 C T P .E/ .t/ x ; x .0/ D x0 Remark 1. The above alluded to symmetrization step yields symmetric Riccati equations (72) and (75), for otherwise “new” Riccati equations are obtained, as in [9]. We shall use the following notation. In the game where P plays closed-loop and E plays open-loop we denote the solution of the system of Riccati equations (27) and .P/ .E/ (28) by PCO .t/ and PCO .t/. Conversely, if P plays open-loop and E plays closedloop, the system of Riccati equations (27) and (28) is re-derived and its solution is .P/ .E/ then denoted by POC .t/ and POC .t/. In both cases, the system of Riccati equations is the system (27) and (28) which pertains to the case where both players use closedloop strategies and the solution P .P/ .t/ and P .E/ .t/ of (27) and (28) is denoted by .P/ .E/ PC C .t/ and PC C .t/, respectively. In summary, the following holds. Proposition 3. In nonzero-sum open-loop/closed-loop and closed-loop/open-loop LQ differential games, the players’ values are equal to the players’ values in the game where both players use closed-loop strategies—in other words, .P/

.P/

.E/

.E/

.P/

.P/

.E/

.E/

POC .t/ D PC C .t/ D P .P/ .t/ and POC .t/ D PC C .t/ D P .E/ .t/ Similarly, PCO .t/ D PC C .t/ D P .P/ .t/ and PCO .t/ D PC C .t/ D P .E/ .t/ 8 0 t T. Also recall that for the case where both P and E play open-loop, the solution of .P/ .E/ the Riccati system (57) and (58), denoted by POO .t/ and POO .t/, applies.

302

M. Pachter and K. Pham

6.1 Discussion When P plays closed-loop, the players’ values are as in the closed-loop differential game where both players use closed-loop strategies, that is, V .P/ .t; x/ D .P/ .E/ x T PC C .t/x D x T P .P/ .t/x and V .E/ .t; x/ D x T PC C .t/x D x T P .E/ .t/x— irrespective of whether player E plays open-loop or closed-loop. The converse is also true: when E plays closed-loop, the players’ values are as in the closed-loop differential game, irrespective of whether player P plays open-loop or closed-loop. However, it is advantageous for both players to play open-loop; their values/costs are reduced compared to the case where they both play closed-loop: .P/

.P/

.E/

.E/

POO .t/ < PC C .t/ and POO .t/ < PC C .t/ If however just one of the players plays open-loop and his opponent plays closedloop, then both players’ values are the higher closed-loop values.

7 Conclusion In this article nonzero-sum differential games are addressed. When nonzero-sum games are considered, there is no reason to believe that strategies might exist s.t. all the players are able to minimize their own cost and the natural optimality concept is the Nash equilibrium (NE). Now, the NE concept is somewhat problematic, because, first of all, it is not necessarily unique. If the NE is unique, the definition of NE strategy is appealing: by definition, a player’s NE strategy is s.t. should he not adhere to it while his opposition does stick to its NE strategy, his cost will increase and he will be penalized. Thus, assuming that the opposition will in fact execute its NE strategy, a player will be wise to adhere to his NE strategy. Note however that this is not to say that by having all parties deviate from their respective NE strategies, they would not all do better—think of the Prisoner’s Dilemma game. Now, in the special case of zero-sum games, the NE is a saddle point: hence, an NE strategy is a security strategy, the value of the game is unique, and the uniqueness of optimal strategies is not an issue because they are interchangeable. Evidently, nonzero-sum games are more complex than zero-sum games. This is even more so when dynamic games, and, in particular, nonzero-sum differential games, are addressed. In this article the open-loop and closed-loop information patterns in nonzero-sum differential games are examined. The results are specialized with reference to LQ differential games. It is explicitly shown that in LQ differential games, somewhat paradoxically, openloop NE strategies are superior to closed-loop NE strategies. Moreover, even if only

The Role of Information in Nonzero-Sum Differential Games

303

one party employs closed-loop control, both players’ values are the inferior values of the game where both players employ closed-loop strategies. This state of affairs can be attributed to the inherent weakness of the NE solution concept, which is not apparent in zero-sum differential games.

References 1. Case, J.H.: Equilibrium Points of N-Person Differential Games, University of Michigan, Department of industrial Engineering, TR No 1967–1, (1967) 2. Case, J.H.: Toward a theory of many player differential games. SIAM J. Control 7(2), 179–197 (1969) 3. Starr, A.W., Ho, Y.C.: Nonzero-sum differential games. J. Optimiz. Theory. App. 3(3), 184–206 (1969) 4. Starr, A.W., Ho, Y.C.: Further properties of nonzero-sum differential games. J. Optimiz. Theory. App. 3(4), 207–218 (1969) 5. Byung-Wook Wie: A differential game model of nash equilibrium on a congested traffic network. Networks 23(6), 557–565 (1993) 6. Byung-Wook Wie: A differential game approach to the dynamics of mixed behavior traffic network equilibrium problem. Eur. J. Oper. Res. 83, 117–136 (1995) 7. Olsder, G.J.: On open and closed-loop bang-bang control in nonzero-sum differential games. SIAM J. Control Optim. 40(4), 1087–1106 (2002) 8. Basar, T., Olsder G.J.: Dynamic Noncooperative Game Theory. SIAM, London, UK (1999) 9. Engwerda, J.C: LQ Dynamic Optimization and Differential Games. Wiley, Chichester, UK (2005)

Information Considerations in Multi-Person Cooperative Control/Decision Problems: Information Sets, Sufficient Information Flows, and Risk-Averse Decision Rules for Performance Robustness Khanh D. Pham and Meir Pachter

Abstract The purpose of this research investigation is to describe the main concepts, ideas, and operating principles of stochastic multi-agent control or decision problems. In such problems, there may be more than one controller/agent not only trying to influence the continuous-time evolution of the overall process of the system, but also being coupled through the cooperative goal for collective performance. The mathematical treatment is rather fundamental; the emphasis of the article is on motivation for using the common knowledge of a process and goal information. The article then starts with a discussion of sufficient information flows with a feedforward structure providing coupling information about the control/decision rules to all agents in the cooperative system. Some attention has been paid to the design of decentralized filtering via constrained filters for the multi-agent dynamic control/decision problem considered herein. The main focus is on the synthesis of decision strategies for reliable performance. That is on mathematical statistics associated with an integral-quadratic performance measure of the generalized chisquared type, which can later be exploited as the essential commodity to ensure much of the design-in reliability incorporated in the development phase. The last part of the article gives a comprehensive presentation of the broad and still developing area of risk-averse controls. It is possible to show that each agent with

K.D. Pham Air Force Research Laboratory, Space Vehicles Directorate, Kirtland Air Force Base, Albuquerque, NM 87117, USA e-mail: [email protected] M. Pachter () Air Force Institute of Technology, Department of Electrical and Computer Engineering, Wright-Patterson Air Force Base, Dayton, OH 45433, USA e-mail: [email protected] 305 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 16, © Springer Science+Business Media New York 2012

306

K.D. Pham and M. Pachter

risk-averse attitudes not only adopts the use of a full-state dimension and linear dynamic compensator driven by local measurements, but also generates cooperative control signals and coordinated decisions. Keywords Stochastic multi-agent cooperative control/decision problems • Performance-measure statistics • Performance reliability • Risk-averse control decisions • Matrix minimum principle • Necessary and sufficient conditions

1 Introduction Throughout the article, the superscript T in the notation is denoted for the transposition of vector or matrix entities. In addition, .˝; F; F; P/ is a complete filtered probability space and a standard p-dimensional Wiener process w.t/ w.t; !/ and ! 2 ˝ with the correlation of independent increments given by EfŒw.t1 / w.t2 /Œw.t1 / w.t2 /T g D W jt1 t2 j, W > 0 for all t1 ; t2 2 Œ0; T and w.0/ D 0 which generates the filtration F , Ft and Ft D fw.s/ W 0 s tg augmented by all P-null sets in F . Consider the following controlled stochastic problem: dx.t/ D f .t; x.t/; u.t//dt C g.t/dw.t/;

t 2 Œ0; T

x.0/ D x0

(1)

and a performance measure Z

T

J.u.// D

q.t; x.t/; u.t//dt C h.x.T // :

(2)

0

Here, x.t/ x.t; !/ is the controlled state process valued in Rn , u.t/ u.t; !/ is the control process valued in some set U Rm bounded or unbounded and g.t/ g.t; !/ is an n p matrix, ! 2 ˝. In the setting (1)–(2), f .t; x; u; !/ W R Rn Rm ˝ 7! Rn , q.t; x; u; !/ W R Rn Rm ˝ 7! R and h.x/ W Rn 7! R are given measurable functions. It is assumed that the random functions f .t; x; u; !/ and q.t; x; u; !/ are continuous for fixed ! 2 ˝ and are progressively measurable with respect to Ft for fixed .x; u/. The function h.x/ W Rn 7! R is continuous. To best explain the sort of applications to be addressed for the stochastic control problem (1)–(2), it is commenced by giving a brief description of stochastic multiagent cooperative decision and control problems of more than one controllers and/or agents, who not only try to influence the continuous-time evolution of the overall controlled process with local imperfect measurements but also coordinate actions through the same performance measure. In such a partially decentralized situation, u./ , .u1 ./; : : : ; uN .// of which ui ./ is the extreme control of the i th controller or agent, valued in Ui Rmi with m1 C C mN D m, and is to be chosen to

Information Considerations in Multi-Person Cooperative Control...

307

optimize expected values and variations of J.u.//. Furthermore, it seems unlikely that a closed-loop solution will be available in closed-form for this stochastic multi-agent cooperative control and/or decision problem except, possibly, under the structural constraints of linear system dynamics, quadratic cost functionals, and additive independent white Gaussian noises corrupting the system dynamics and measurements. For this reason, attention in this research investigation is directed primarily toward the stochastic control and/or decision problem with multiple agents, which has linear system dynamics, quadratic cost functionals, and uncorrelated standard Wiener process noises additively corrupting the controlled system dynamics and output measurements. Notice that under these conditions the quadratic cost functional associated with this problem class is a random variable with the generalized chi-squared probability distributions. If a measure of uncertainty, such as the variance of the possible outcome, was used in addition to the expected outcome, then the agents should be able to correctly order preferences for alternatives. This claim seems plausible, but it is not always correct. Various investigations have indicated that any evaluation scheme based on just the expected outcome and outcome variations would necessarily imply indifference between some courses of action; therefore, no criterion based solely on the two attributes of means and variances can correctly represent their preferences. See [1, 2] for early important observations and findings. As will be clear in the research development herein, the shape and functional form of a utility function tell us a great deal about the basic attitudes of the agents or decision makers toward the uncertain outcomes or performance risks. Of particular interest, the new utility function or the so-called risk-value aware performance index, which is proposed herein as a linear manifold defined by a finite number of centralized moments associated with a random performance measure of integral quadratic form, will provide a convenient allocation representation of apportioning performance robustness and reliability requirements into the multiattribute requirement of qualitative characteristics of expected performance and performance risks. The technical approach to a solution for the stochastic multiagent cooperative control or decision problem under consideration and its research contributions rest upon: (a) the acquisition and utilization of insights, regarding whether the agents are risk averse or risk prone and thus restrictions on the utility functions implied by these attitudes and (b) the adaptation of decision strategies to meet difficult environments, as well as best courses of action to ensure performance robustness and reliability, provided that the agents be subscribed to certain attitudes. The rest of the article is organized as follows. In Sect. 2 the stochastic two-agent cooperative problem with the linear-quadratic structure is formulated. Section 3 is devoted to decentralized filtering via constrained filters derived for cooperative agents with different information patterns. In addition, the mathematical analysis of higher-order statistics associated with the performance-measure is of concern in Sect. 4. Section 5 applies the first- and second-order conditions of the matrix minimum principle for optimal controls of the stochastic cooperative problem. Finally, Sect. 6 gives some concluding remarks.

308

K.D. Pham and M. Pachter

Agent 1

A1 x^ 1(t0)

D1

∑

∑

∫

x^ 1(t)

K1

u1 (t)

L1 v1(t)

x(t0) u1 (t)

u2 (t)

B1

x(t) ∫

∑

B2

∑

A

C1

∑

C2

∑

z1(t)

z2(t)

v2(t) Agent 2

L2 x^ 2(t0)

D2

∫

∑

x^ 2(t)

∑

K2

u2 (t)

A2

Fig. 1 Interaction architecture of a stochastic multi-agent cooperative system

2 Problem Formulation and Preliminaries In this section, some preliminaries are in order. First of all, some spaces of random variables and stochastic processes are introduced ˚ ˚ L2Ft .˝I Rn / , W ˝ 7! Rn j is Ft -measurable, E jjjj2 < 1 ; 2 k LF .0; T I R / , f W Œ0; T ˝ 7! Rk jf ./ is F-adapted, Z

T

E

2

jjf .t/jj dt

0 V2 > 0

whose a priori second-order statistics V1 and V2 are also assumed known to both agents. For simplicity, both agents consider the initial state x.0/ to be known. Associated with each .u1 ; u2 / 2 U1 U2 is a path-wise finite-horizon integralquadratic form (IQF) performance measure with the generalized chi-squared random distribution, for which both agents attempt to coordinate their actions J.u1 ./; u2 .// D x T .T /QT x.T / Z T T C x .t/Q.t/x.t/ C uT1 .t/R1 .t/u1 .t/ C uT2 .t/R2 .t/u2 .t/ dt 0

(6) where the terminal penalty weighting QT 2 Rnn , the state weighting Q.t/ Q.t; !/ W Œ0; T ˝ 7! Rnn and control weightings R1 .t/ R1 .t; !/ W Œ0; T ˝ 7! Rm1 m1 and R2 .t/ R2 .t; !/ W Œ0; T ˝ 7! Rm2 m2 are continuous-time matrix functions with the properties of symmetry and positive semi-definiteness. In addition, R1 .t/ and R2 .t/ are invertible. Denote by Yi and i D 1; 2 the output functions measured by agents up to time t Yi .t/ , f.; yi .//I 2 Œ0; t/g ;

i D 1; 2 :

310

K.D. Pham and M. Pachter

Then the information structure is defined as follows: Zi .t/ , Yi .t/ [ fa priori informationg : Notice that the information structures Zi .t/ and i D 1; 2 include the a priori information available to agents so that in particular, either Zi .0/ is simply the a priori information when either of them has no output measurements at all.

3 Decentralized Filtering via Constrained Filters This work is concerned with decentralized filtering where each agent is constrained to make local noise state measurements. No exchange of online information is allowed, and each agent must generate its own online control decisions based upon its local processing resources. As an illustration, the information describing the system of the form (3)–(5) can be naturally grouped into three classes: (i) local model data, IMDi .t/ , fA.t/; Bi .t/; G.t/; Ci .t/g; (ii) local process data of statistical parameters concerning the stochastic processes, IPDi , fx0 ; W; Vi g; and (iii) online data available from local measurements, IODi .t/ , fyi .t/g with i D 1; 2 and t 2 Œ0; T . Hence, the information flow, as defined by Ii .t/ , IMDi .t/ [ IPDi [ IODi .t/, is available at agent i ’s location. Next, a simple class of implementable filter structures is introduced for the case of distributed information flows herein. Subsequently, instead of allowing each agent to preserve and use the entire output function that it has measured up to the time t, agent i is now restricted to generate and use only a vector-valued function that satisfies a linear, nth order dynamic system, which also gives unbiased estimates dxO i .t/ D .Ai .t/xO i .t/ C Di .t/ui .t//dt C Li .t/dyi .t/ ;

i D 1; 2

(7)

wherein the continuous-time matrices Ai .t/ Ai .t; !/ W Œ0; T ˝ 7! Rnn , Di .t/ Di .t; !/ W Œ0; T ˝ 7! Rnmi , Li .t/ Li .t; !/ W Œ0; T ˝ 7! Rnri and the initial condition xO i .0/ are to be selected by agent i while the expected value of the current state x.t/ given the measured output function Yi .t/ is denoted by xO i .t/. Notice that the filter (7), as proposed here is not the Stratonovich–Kalman– Bucy filter although it is linear and unbiased. The decentralized filtering problem is to determine matrix coefficients Ai ./, Di ./, Li ./, and initial filter states such that xO i .t/ are unbiased estimates of x.t/ for all ui .t/ and i D 1; 2. With respect to the structures of online dynamic control as considered in Fig. 1, practical control decisions with feedback ui D ui .t; Zi .t// for agent i and i D 1; 2 are reasonably constrained to be linear transformations of unbiased estimates from the linear filters driven by the local measurements (7) ui .t/ D ui .t; xO i .t// , Ki .t/xO i .t/ ;

i D 1; 2

(8)

Information Considerations in Multi-Person Cooperative Control...

311

where the decision control gains Ki .t/ D Ki .t; !/ W Œ0; T ˝ 7! Rmi n will be appropriately defined such that the corresponding set Ui of admissible controls consisting of all functions ui .t; !/ W Œ0; T ˝ 7! Rmi , which are progressively RT measurable with respect to Ft and Ef 0 jjui .t; !/jj2 dtg < 1. Using (3), (7), and (8) it is easily shown that the estimation errors satisfy dx.t/ dxO 1 .t/ D .A.t/ A1 .t/ C B2 .t/K2 .t/ L1 .t/C1 .t//x.t/dt B2 .t/K2 .t/.x.t/ xO 2 .t//dt C A1 .t/.x.t/ xO 1 .t//dt C .B1 .t/ D1 .t//K1 .t/xO 1 .t/dt C G.t/dw.t/ L1 .t/dv1 .t/ (9) dx.t/ dxO 2 .t/ D .A.t/ A2 .t/ C B1 .t/K1 .t/ L2 .t/C2 .t//x.t/dt B1 .t/K1 .t/.x.t/ xO 1 .t//dt C A2 .t/.x.t/ xO 2 .t//dt C .B2 .t/ D2 .t//K2 .t/xO 2 .t/dt C G.t/dw.t/ L2 .t/dv2 .t/ : (10) Furthermore, it requires to have both xO 1 .t/ and xO 2 .t/ to be unbiased estimates of x.t/ for all u1 .t/ and u2 .t/, that is, for all t 2 Œ0; T , i D 1; 2 and j D 1; 2 Efx.t/ xO i .t/jZj .t/g D 0:

(11)

Now if the requirement (11) is satisfied, then for each t it follows that Efdx.t/ dxO i .t/jZj .t/g D 0 ;

i D 1; 2 ;

j D 1; 2:

(12)

Hence, from (9), (10), and the fact that w.t/ and vi .t/ with i D 1; 2 are the zeromean random processes the necessary conditions for unbiased estimates then are A1 .t/ D A.t/ C B2 .t/K2 .t/ L1 .t/C1 .t/

(13)

A2 .t/ D A.t/ C B1 .t/K1 .t/ L2 .t/C2 .t/

(14)

D1 .t/ D B1 .t/

(15)

D2 .t/ D B2 .t/ :

(16)

In addition, letting t D 0 in (11) results in the condition xO i .0; !/ D x0 ;

8! 2 ˝;

i D 1; 2:

(17)

On the other hand, using conditions (13)–(17) together with expressions (9) and (10) it follows that for t 2 Œ0; T and j D 1; 2

312

K.D. Pham and M. Pachter

Efdx.t/ dxO 1 .t/jZj .t/g D A1 .t/Efx.t/ xO 1 .t/jZj .t/gdt B2 .t/K2 .t/Efx.t/ xO 2 .t/jZj .t/gdt Efdx.t/ dxO 2 .t/jZj .t/g D A2 .t/Efx.t/ xO 2 .t/jZj .t/gdt B1 .t/K1 .t/Efx.t/ xO 1 .t/jZj .t/gdt and ˇ ˇ Efx.t/ x.t/jZ O j .t/g t D0 D 0 : Therefore, the conditions (13)–(17) are also sufficient for unbiased estimates. Henceforth, the class of decentralized filtering via constrained filters is characterized by the stochastic differential equation together with i D 1; 2, j D 1; 2, and j ¤ i dxO i .t/ D Œ.A.t/ C Bj .t/Kj .t//xO i .t/ C Bi .t/ui .t/dt C Li .t/.dyi Ci .t/xO i .t// xO i .0/ D x0

(18)

wherein the filter gain Li .t/ remains to be chosen by agent i in an optimal manner relative to the collective performance measure defined in (6).

4 Mathematical Statistics for Collective Performance Robustness To progress toward the cooperation situation, the aggregate dynamics composing of agent interactions, distributed decision making and local autonomy are, therefore, governed by the controlled stochastic differential equation O dz.t/ D FO .t/z.t/dt C G.t/d w.t/ O ;

z.0/ D z0

(19)

in which for each t 2 Œ0; T , the augmented state variables, the underlying process noises, and the system coefficients are given by 2

3 x z , 4 x xO 1 5 ; x xO 2

2

3 x0 z0 , 4 0 5 ; 0

3 w wO , 4 v1 5 v2 2

Information Considerations in Multi-Person Cooperative Control...

313

and 2

3 A C B1 K1 C B2 K2 B1 K1 B2 K2 5 FO , 4 0 A C B2 K2 L1 C1 B2 K2 0 B1 K1 A C B1 K1 L2 C2 2 3 2 3 G 0 0 W 0 0 GO , 4 G L1 0 5 ; WO , 4 0 V1 0 5 G 0 L2 0 0 V2

(20)

(21)

O 2 /Œw.t O 1 / w.t O 2 /T g D WO jt1 t2 j for all t1 ; t2 2 Œ0; T . with EfŒw.t O 1 / w.t Moreover, the pairs .A./; Bi .// and .A./; Ci .// for i D 1; 2 are assumed to be uniformly stabilizable and detectable, respectively. Under this assumption, such feedback and filter gains Ki ./ and Li ./ for i D 1; 2 exist so that the aggregate system dynamics is uniformly exponentially stable. In other words, there exist positive constants 1 and 2 such that the pointwise matrix norm of the state transition matrix of the closed-loop system matrix FO ./ satisfies the inequality jj˚FO .t; /jj 1 e 2 .t / ;

8t 0:

(22)

In most of the type of problems under consideration and available results in team theory [3] and large-scale systems [4], it is apparent that there is lack of analysis of performance risk and stochastic preferences beyond statistical averaging. Henceforth, the following development is vital to examine what it means for performance riskiness from the standpoint of higher-order characteristics pertaining to performance sampling distributions. Specifically, for each admissible tuple .K1 ./; K2 .//, the path-wise performance measure (6), which contains trade-offs between dynamic agent coordination and system performance, is now rewritten as J.K1 ./; K2 .// D z .T /NO T z.T / C T

Z

T

zT .t/NO .t/z.t/dt

(23)

0

where the positive semi-definite terminal penalty NO T 2 R3n3n and positive definite transient weighting NO .t/ D NO .t; !/ W Œ0; T ˝ 7! R3n3n are given by 2

3 3 2 T QT 0 0 K1 R1 K1 C K2T R2 K2 C Q K1T R1 K1 K2T R2 K2 5 NO T , 4 0 0 0 5 ; NO , 4 K1T R1 K1 K1T R1 K1 0 T T K2 R2 K2 0 K2 R2 K2 0 00 (24) So far there are two types of information, that is, process information (19)–(21) and goal information (23)–(24) have been given in advance to cooperative agents 1 and 2. Because there is random disturbance of the process w./ O affecting the overall

314

K.D. Pham and M. Pachter

performance, both cooperative agents now need additional information about performance variations. This is coupling information and thus also known as performance information. It is natural to further assume that cooperative agents are risk averse. They both prefer to avoid the risks associated with collective performance. And, for the reason of measure of effectiveness, much of the discussion that follows will be concerned with the situation where cooperative agents have risk-averse attitudes toward all process random realizations. Regarding the linear-quadratic structural constraints (19) and (23), the path-wise performance measure (23) with which the cooperative agents are coordinating their actions is clearly a random variable of the generalized chi-squared type. Hence, the degree of uncertainty of the path-wise performance measure (23) must be assessed via a complete set of higher-order statistics beyond the statistical mean or average. The essence of information about these higher-order performance-measure statistics in an attempt to describe or model performance uncertainty is now considered as a source of information flow, which will affect perception of the problem and the environment at each cooperative agent. Next, the question of how to characterize and influence performance information is answered by modeling and management of cumulants (also known as semi-invariants) associated with (23) as shown in the following result. Theorem 1 Let z./ be a state variable of the stochastic cooperative dynamics (19) with initial values z./ z and 2 Œ0; T . Further let the moment-generating function be denoted by ˚ ' .; z ; / D % .; / exp zT .; /z

(25)

2 RC :

(26)

.; / D lnf% .; /g ;

Then the cumulant-generating function has the form of quadratic affine .; z ; / D zT .; /z C .; /

(27)

where the scalar solution .; / solves the backward-in-time differential equation o n d .; / D Tr .; /GO ./ WO GO T ./ ; d

.T; / D 0

(28)

and the matrix solution .; / satisfies the backward-in-time differential equation d .; / D FO T ./ .; / .; /FO ./ d O WO GO T ./ .; / NO ./; 2 .; /G./

.T; / D NO f : (29)

Information Considerations in Multi-Person Cooperative Control...

315

Meanwhile, the scalar solution %./ satisfies the backward-in-time differential equation n o d % .; / D % .; / Tr .; /GO ./ WO GO T ./ ; d

% .T; / D 1 :

(30)

Proof. For notional simplicity, it is convenient to have $ .; z ; / , exp fJ .; z /g in which the performance measure (23) is rewritten as the costto-go function from an arbitrary state z at a running time 2 Œ0; T , that is, J.; z / D zT .T /NO T z.T / C

Z

T

zT .t/NO .t/z.t/dt

(31)

subject to O dz.t/ D FO .t/z.t/dt C G.t/d w.t/ O ;

z./ D z :

(32)

By definition, the moment-generating function is '.; z ; / , E f$ .; z ; /g. Thus, the total time derivative of '.; z ; / is obtained as d ' .; z ; / D ' .; z ; / zT NO ./z : d Using the standard Ito’s formula, it follows d' .; z ; / D E fd$ .; z ; /g n o o 1 n O WO GO T ./ d ; D E $ .; z ; / dC$z .; z ; / dz C Tr $z z .; z ; /G./ 2 o 1 n O WO GO T ./ d D ' .; z ; /d C 'z .; z ; /FO ./z d C Tr 'z z .; z ; /G./ 2 ˚ which under the hypothesis of ' .; z ; / D % .; / exp xT a .; /x and its partial derivatives "

# d ' .; z ; / D ' .; z ; / C .; /z %.; / d 'z .; z ; / D ' .; z ; / zT .; / C T .; / 'z z .; x ; / D ' .; z ; / .; / C T .; / C ' .; z ; / .; / C T .; / z zT .; / C T .; / d %.; / d

zT

316

K.D. Pham and M. Pachter

leads to the result d % .; / d ' .; z ; / C ' .; z ; / zT .; /z ' .; z ; / zT NO ./z D d % .; / d h i C ' .; z ; / zT FO T ./ .; / C .; /FO ./ z h O WO GO T ./ .; /z C ' .; z ; / 2zT .; /G./ n oi O WO GO T ./ : CTr .; /G./

To have constant and quadratic terms being independent of arbitrary z , it requires d O WO GO T ./ .; / NO ./ .; / D FO T ./ .; / .; /FO ./ 2 .; /G./ d o n d O WO GO T ./ %.; / D % .; / Tr .; /G./ d

with the terminal-value conditions .T; / D NO T and %.T; / D 1. Finally, the backward-in-time differential equation satisfied by .; / is obtained n o d O WO GO T ./ ; .; / D Tr .; /G./ d

.T; / D 0 :

t u

As it turns out that all the higher-order characteristic distributions associated with performance uncertainty and risk are very well captured in the higher-order performance-measure statistics associated with (31). Subsequently, higher-order statistics that encapsulate the uncertain nature of (31) can now be generated via a MacLaurin series of the cumulant-generating function (27) ˇ 1 X ˇ @.r/ r r ˇ .; z ; / , D r .z / .; z ; / ˇ rŠ @ .r/ D0 rŠ rD1 rD1 1 X

(33)

in which r .z /’s are called performance-measure statistics. Moreover, the series expansion coefficients are computed by using the cumulant-generating function (27) ˇ ˇ ˇ .r/ ˇ ˇ ˇ @.r/ @.r/ T @ ˇ ˇ .; z ; /ˇ D z .; /ˇ z C .; /ˇˇ : .r/ .r/ @ .r/ @ @ D0 D0 D0

(34)

In view of the definition (33), the rth performance-measure statistic therefore follows ˇ ˇ ˇ ˇ @.r/ @.r/ ˇ ˇ .; / z C .; / (35) r .z / D zT ˇ ˇ .r/ .r/ @ @ D0 D0

Information Considerations in Multi-Person Cooperative Control...

317

for any finite 1 r < 1. For notational convenience, the following change of notations: ˇ ˇ ˇ ˇ @.r/ @.r/ ˇ .; /ˇ and Dr ./ , .; /ˇˇ (36) Hr ./ , .r/ .r/ @ @ D0 D0 are introduced so that the next theorem provides an effective and accurate capability for forecasting all the higher-order characteristics associated with performance uncertainty. Therefore, via higher-order performance-measure statistics and adaptive decision making, it is anticipated that future performance variations will lose the element of surprise due to the inherent property of self-enforcing and risk-averse decision solutions that are readily capable of reshaping the cumulative probability distribution of closed-loop performance. Theorem 2 Performance-Measure Statistics Let the stochastic two-agent cooperative system be described by (19) and (23) in which the pairs .A; B1 / and .A; B2 / are uniformly stabilizable and the pairs .A; C1 / and .A; C2 / are uniformly detectable. For k 2 N fixed, the kth cumulant of performance measure (23) is given by k .z0 / D zT0 Hk .0/z0 C Dk .0/

(37)

where the supporting variables fHr ./gkrD1 and fDr ./gkrD1 evaluated at D 0 satisfy the differential equations (with the dependence of Hr ./ and Dr ./ upon K1 ./, K2 ./, L1 ./ and L2 ./ suppressed) d H1 ./ D FO T ./H1 ./ H1 ./FO ./ NO ./ d d Hr ./ D FO T ./Hr ./ Hr ./FO ./ d

r1 X sD1

2rŠ O WO GO T ./Hrs ./ ; Hs ./G./ sŠ.r s/Š

n o d O WO GO T ./ ; Dr ./ D Tr Hr ./G./ d

1r k

(38)

2 r k (39) (40)

where the terminal-value conditions H1 .T / D NO T , Hr .T / D 0 for 2 r k and Dr .T / D 0 for 1 r k. Proof. The expression of performance-measure statistics described in (37) is readily justified by using result (35) and definition (36). What remains is to show that the solutions Hr ./ and Dr ./ for 1 r k indeed satisfy the dynamical equations (38)–(40). Notice that the dynamical equations (38)–(40) are satisfied by the solutions Hr ./ and Dr ./ and can be obtained by successively taking time

318

K.D. Pham and M. Pachter

derivatives with respect to of the supporting equations (28)–(29) together with the assumption of .A; B1 / and .A; B2 / being uniformly stabilizable on Œ0; T . t u

5 Cooperative Decision Strategies with Risk Aversion The purpose of this section is to provide statements of the optimal statistical control with the addition of the necessary and sufficient conditions for optimality for the stochastic two-agent cooperative control and decision problem that are considered in this research investigation. The optimal statistical control of stochastic twoagent cooperative systems herein is distinguished by the fact that the evolution in time of all mathematical statistics (37) associated with the random performance measure (23) of the generalized chi-squared type are naturally described by means of matrix differential equations (38)–(40). For such problems it is important to have a compact statement of the optimal statistical control so as to aid mathematical manipulation. To make this more precise, one may think of the k-tuple state variables H./ , .H1 ./; : : : ; Hk .// and D./ , .D1 ./; : : : ; Dk .// whose continuously differentiable states Hr 2 C 1 .Œ0; T I R3n3n / and Dr 2 C 1 .Œ0; T I R/ having the representations Hr ./ , Hr ./ and Dr ./ , Dr ./ with the right members satisfying the dynamics (38)–(40) are defined on Œ0; T . In the remainder of the development, the convenient mappings are introduced as follows Fr W Œ0; T .R3n3n /k 7! R3n3n Gr W Œ0; T .R3n3n /k 7! R where the rules of action are given by F1 .; H/ , FO T ./H1 ./ H1 ./FO ./ NO ./ Fr .; H/ , FO T ./Hr ./ Hr ./FO ./ r1 X

2rŠ O WO GO T ./Hrs ./ ; Hs ./G./ sŠ.r s/Š sD1 n o O WO GO T ./ ; Gr .; H/ , Tr Hr ./G./ 1 r k:

2r k

The product mappings that follow are necessary for a compact formulation F1 Fk W Œ0; T .R3n3n /k 7! .R3n3n /k G1 Gk W Œ0; T .R3n3n /k 7! Rk

Information Considerations in Multi-Person Cooperative Control...

319

whereby the corresponding notations F , F1 Fk and G , G1 Gk are used. Thus, the dynamic equations of motion (38)–(40) can be rewritten as d H./ D F .; H.//; H.T / HT (41) d d (42) D./ D G .; H.// ; D.T / DT d where k-tuple values HT , NO T ; 0; : : : ; 0 and DT D .0; : : : ; 0/. Notice that the product system uniquely determines the state matrices H and D once the admissible feedback gain K1 and K2 together with admissible filtering gains L1 and L2 being specified. Henceforth, these state variables will be considered as H H.; K1 ; K2 ; L1 ; L2 / and D D.; K1 ; K2 ; L1 ; L2 /. The performance index in optimal statistical control problems can now be formulated in K1 , K2 , L1 , and L2 . For the given terminal data .T; HT ; DT /, the classes of admissible feedback and filter gains are next defined. Definition 1 Admissible Filter and Feedback Gains Let compact subsets Li Rnri and K i Rmi n and i D 1; 2 be the sets of allowable filter and feedback gain values. For the given k 2 N and sequence D f r 0gkrD1 with 1 > 0, the set of admissible filter gains LiT;HT ;DT I and feedback i gains KT;H are, respectively, assumed to be the classes of C.Œ0; T I Rnri / and T ;DT I

C.Œ0; T I Rmi n / with values Li ./ 2 Li and Ki ./ 2 K i for which solutions to the dynamic equations (41)–(42) with the terminal-value conditions H.T / D HT and D.T / D DT exist on the interval of optimization Œ0; T . It is now crucial to plan for robust decisions and performance reliability from the start because it is going to be much more difficult and expensive to add reliability to the process later. To be used in the design process, performance-based reliability requirements must be verifiable by analysis; in particular, they must be measurable, like all higher-order performance-measure statistics, as evidenced in the previous section. These higher-order performance-measure statistics become the test criteria for the requirement of performance-based reliability. What follows is risk-value aware performance index in the optimal statistical control. It naturally contains some trade-offs between performance values and risks for the subject class of stochastic decision problems. i On the Cartesian product LiT;HT ;DT I KT;H and i D 1; 2, the performance T ;DT I

index with risk-value considerations in the optimal statistical control is subsequently defined as follows. Definition 2 Risk-Value Aware Performance Index Fix k 2 N and the sequence of scalar coefficients D f r 0gkrD1 with 1 > 0. Then for the given z0 , the risk-value aware performance index 0 W .R3n3n /k Rk 7! RC

320

K.D. Pham and M. Pachter

pertaining to the optimal statistical control of the stochastic cooperative decision problem involved two agents over Œ0; T is defined by 0 .H; D/ ,

D

1 1 .z0 / C 2 2 .z0 / C C k k .z0 / ƒ‚ … „ ƒ‚ … „ Value Measure Risk Measures k X

r zT0 Hr .0/z0 C Dr .0/

(43)

rD1

where additional design freedom by means of r ’s utilized by cooperative agents are sufficient to meet and exceed different levels of performance-based reliability requirements, for instance, mean (i.e., the average of performance measure), variance (i.e., the dispersion of values of performance measure around its mean), skewness (i.e., the antisymmetry of the density of performance measure), kurtosis (i.e., the heaviness in the density tails of performance measure), etc., pertaining to closed-loop performance variations and uncertainties while the cumulantgenerating solutions fHr ./gkrD1 and fDr ./gkrD1 evaluated at D 0 satisfy the dynamical equations (41)–(42). Notice that the assumption of all r 0 with 1 > 0 and r D 1; : : : ; k in the definition of risk-averse performance index is assumed for strictly order preserving and well-posedness of the optimization at hand. This assumption, however, cannot be always justified, because human subjects are also well known to exhibit risktaking patterns in certain situations (e.g., when higher values of dispersion are preferred). Next, the optimization statement for the statistical control of the stochastic cooperative system for two agents over a finite horizon is stated. Definition 3 Optimization Problem Given 1 ; : : : ; k with 1 > 0, the optimization problem of the statistical control over Œ0; T is given by Li ./2LiT;H

0 .H; D/ ;

min T ;DT I

;Ki ./2KiT;H

i D 1; 2

(44)

T ;DT I

subject to the dynamical equations (41)–(42) for 2 Œ0; T . Opposite to the spirit of the earlier work by the authors [5, 6] relative to the traditional approach of dynamic programming to the optimization problem of Mayer form, the problem (44) of finding extremals may, however, be recast as that of minimizing the fixed-time optimization problem in Bolza form, that is, 0 .0; X / D Tr

˚

X .0/z0 zT0

Z

T

C 0

n o O WO GO T .t/ dt Tr X .t/G.t/

(45)

Information Considerations in Multi-Person Cooperative Control...

321

subject to d X ./ D FO T ./X ./ X ./FO ./ 1 NO ./ d

k X

r

rD2

r1 X sD1

2rŠ O WO GO T ./Hrs ./ ; Hs ./G./ sŠ.r s/Š

M.T / D 1 NO T

(46)

wherein X ./ , 1 H1 ./ C C k Hk ./ and fHr ./gkrD1 are satisfying the dynamical equations (38)–(40) for all 2 Œ0; T . Furthermore, the transformation of problem (45) and (46) into the framework required by the matrix minimum principle [7] that makes it possible to apply Pontryagin’s results directly to problems whose state variables are most conveniently regarded as matrices is complete if further changes of variables are introduced, that is, T t D and X .T t/ D M.t/. Thus, the aggregate equation (46) is rewritten as d M.t/ DFO T .t/M.t/ C M.t/FO .t/ C 1 NO .t/ dt C

k X rD2

r

r1 X sD1

2rŠ O WO GO T .t/Hrs .t/; Hs .t/G.t/ sŠ.r s/Š

M.0/ D 1 NO T : (47)

Now the matrix coefficients FO , NO , and GO WO GO T of the composite dynamics (19) for agent interaction and estimation are next partitioned to conform with the n-dimensional structure of (3) by means of I0T , I 0 0 ;

I1T , 0 I 0 ;

I2T , 0 0 I

where I is an n n identity matrix and FO D I0 AI0T C I1 AI1T C I2 AI2T C I0 B1 K1 .I0 I1 /T C I2 B1 K1 .I2 I1 /T C I0 B2 K2 .I0 I2 /T C I1 B2 K2 .I1 I2 /T I1 L1 C1 I1T I2 L2 C2 I2T (48) NO D .I0 I1 /K1TR1 K1 .I0 I1 /T C .I0 I2 /K2TR2 K2 .I0 I2 /T C I0 QI0T (49) GO WO GO T D I0 GW G T I1TCI1 GW G T I0TCI1 GW G T I1TC.I0 C I2 /GW G T .I0 CI2 /T C I1 L1 V1 LT1 I1T C I2 L2 V2 LT2 I2T :

(50)

322

K.D. Pham and M. Pachter

i Assume that LiT;HT ;DT I KT;H and i D 1; 2 are nonempty and convex in T ;DT I

1 2 nri mi n R . For all .t; K1 ; K2 ; L1 ; L2 / 2 Œ0; T KT;H KT;H R T ;DT I

T ;DT I

1 2 LT;HT ;DT I LT;HT ;DT I , the maps h.M/ and q.t; M.t; K1 ; K2 ; L1 ; L2 // having the property of twice continuously differentiable, as defined from the risk-value aware performance index (45)

0 .L1 ./; K1 ./; L2 ./; K2 .// Z T D h.M.T // C q.t; M.t; K1 .t/; K2 .t/; L1 .t/; L2 .t///dt 0

˚ D Tr M.T /z0 zT0 C

Z

T 0

n o O WO GO T .t/ dt Tr M.t/G.t/

(51)

are supposed to have all partial derivatives with respect to M up to order 2 being continuous in .M; K1 ; K2 ; L1 ; L2 / with appropriate growths. 1 2 Moreover, any 4-tuple .K1 ; K2 ; L1 ; L2 / 2 KT;H KT;H T ;DT I

T ;DT I

1 2 LT;HT ;DT I LT;HT ;DT I minimizing the risk-value aware performance index (51) is called optimal strategies with risk aversion of the optimization problem (44). The corresponding state process M ./ is called an optimal state process. Further denote P.t/ by the costate matrix associated with M.t/ for each t 2 Œ0; T . The scalar Hamiltonian function for the optimization problem (47) and (51) is thus defined by n

V.t; M; K1 ; K2 ; L1 ; L2 / ,Tr MGO WO G

C

k X rD2

OT

r

r1 X sD1

o

(" C Tr

FO T M C MFO C 1 NO

) # 2rŠ Hs GO WO GO T Hrs P T .t/ : sŠ.r s/Š (52)

whereby in view of (48)–(50), the matrix variables M, FO , NO , etc. shall be considered as M.t; K1 ; K2 ; L1 ; L2 /, FO .t; K1 ; K2 ; L1 ; L2 /, NO .t; K1 ; K2 /, etc., respectively. Using the matrix minimum principle [7], the set of first-order necessary conditions for K1 , K2 , L1 , and L2 to be extremizers is composed of ˇ @V ˇˇ d M .t/ D D .FO /T .t/M .t/ C M .t/FO .t/ C 1 NO .t/ dt @P ˇ C

k X rD2

r

r1 X sD1

2rŠ .t/ ; H .t/GO .t/WO .GO /T .t/Hrs sŠ.r s/Š s

M .0/ D 1 NO T (53)

Information Considerations in Multi-Person Cooperative Control...

323

and ˇ d @V ˇˇ P .t/ D D FO .t/P .t/ P .t/.FO /T .t/ GO .t/WO .GO /T .t/ dt @M ˇ P .T / D z0 zT0 :

(54)

In addition, if .K1 ; K2 ; L1 ; L2 / is a local extremum of (52), it implies that V.t; M .t/; K1 ; K2 ; L1 ; L2 / V.t; M .t/; K1 .t/; K2 .t/; L1 .t/; L2 .t// 0 (55) 1 2 KT;H L1T;HT ;DT I L2T;HT ;DT I and for all .K1 ; K2 ; L1 ; L2 / 2 KT;H T ;DT I

T ;DT I

t 2 Œ0; T . That is,

min

V.t; M .t/; K1 ; K2 ; L1 ; L2 /

.K1 ;K2 ;L1 ;L2 /2K1T;H ;D I K2T;H ;D I L1T;H ;D I L2T;H ;D I

T T T T T T T T

D V.t; M .t/; K1 .t/; K2 .t/; L1 .t/; L2 .t// D 0 ;

8 t 2 Œ0; T :

(56)

Equivalently, it follows that ˇ h i @V ˇˇ T T T 0 D 2B .t/ I M .t/P .t/.I I / C I M .t/P .t/.I I / 0 1 2 1 1 0 2 @K1 ˇ ˇ @V ˇˇ 0 @K2 ˇ

(57) C 2 1 R1 .t/K1 .I0 I1 /T P .t/.I0 I1 / h i D 2B2T .t/ I0T M .t/P .t/.I0 I2 / C I1T M .t/P .t/.I1 I2 / C 2 1 R2 .t/K2 .I0 I2 /T P .t/.I0 I2 /

ˇ @V ˇˇ D 2I1T M .t/P .t/I1 C1T .t/ C 2I1T M .t/I1 L1 V1 0 @L1 ˇ C2

k X

2

rD2

r1 X sD1

2rŠ I T H .t/P .t/Hrs .t/I1 L1 V1 sŠ.r s/Š 1 s

(58)

(59)

ˇ @V ˇˇ 0 D 2I2T M .t/P .t/I2 C2T .t/ C 2I2T M .t/I2 L2 V2 @L2 ˇ C2

k X rD2

2

r1 X sD1

2rŠ I T H .t/P .t/Hrs .t/I2 L2 V2 : sŠ.r s/Š 2 s

(60)

324

K.D. Pham and M. Pachter

Furthermore, the second-order sufficient conditions that ensure the Hamiltonian functional (52) achieving its local minimum, require the following Hessian matrices to be positive definite; in particular, ˇ @2 V ˇˇ D 2 1 R1 .t/ ˝ .I0 I1 /T P .t/.I0 I1 / (61) @K12 ˇ ˇ @2 V ˇˇ D 2 1 R2 .t/ ˝ .I0 I2 /T P .t/.I0 I2 / (62) @K22 ˇ " # ˇ k r1 X X @2 V ˇˇ 2rŠ T H .t/P .t/Hrs .t/ I1 ˝ V1 D 2I1 M .t/ C

r sŠ.r s/Š s @L21 ˇ rD2 sD1 (63) " # ˇ k r1 X X 2rŠ @2 V ˇˇ T M Hs .t/P .t/Hrs D 2I .t/ C

.t/ I2 ˝ V2 r 2 2ˇ sŠ.r s/Š @L2 rD2 sD1 (64) wherein ˝ stands for the Kronecker matrix product operator. By the matrix variation of constants formula [8], the matrix solutions of the cumulant-generating Eqs. (38)–(39) and the costate Eq. (54) can be rewritten in the integral forms, for each 2 Œ0; T Z T H1 ./ D ˚ T .T; /NO T ˚.T; / C ˚.T; t/NO .t/˚.T; t/dt (65)

Hr ./ D

Z

T

˚.T; t/

r1 X sD1

2rŠ H .t/GO .t/WO .GO /T .t/Hrs .t/˚.T; t/dt sŠ.r s/Š s (66)

P ./ D ˚ T .T; /z0 zT0 ˚.T; / C

Z

T

˚.T; t/GO .t/WO .GO /T .t/˚.T; t/dt (67)

provided that d ˚.t; 0/ D FO .t/˚.t; 0/; dt

˚.0; 0/ D I:

(68)

It can easily be verified that the following matrix inequalities hold for all t 2 Œ0; T NO T 0 r1 X sD1

NO ./ > 0 2rŠ H ./GO ./WO .GO /T ./Hrs ./ 0 sŠ.r s/Š s z0 zT0 0 GO ./WO .GO /T ./ > 0 :

Information Considerations in Multi-Person Cooperative Control...

325

Therefore, it implies that fHr ./gkrD1 and thus M ./, as well as P ./ with the integral forms (65)–(67), are positive definite on Œ0; T . Subsequently, one can show that the following matrix inequalities are valid

"

k X

r1 X

.I0 I1 /T P ./.I0 I1 / > 0

(69)

.I0 I2 /T P ./.I0 I2 / > 0 #

(70)

2rŠ Hs ./P ./Hrs ./ I1 > 0 sŠ.r s/Š rD2 sD1 # " k r1 X X 2rŠ T I2 M ./ C H ./P ./Hrs ./ I2 > 0 :

r sŠ.r s/Š s rD2 sD1 I1T M ./ C

r

(71)

(72)

In view of (69)–(72), all the Hessian matrices (61)–(64) are thus positive definite. As the result, the local extremizer .K1 ; K2 ; L1 ; L2 / formed by the first-order necessary conditions (57)–(60) becomes a local minimizer. Notice that the results (53)–(60) are coupled forward-in-time and backwardin-time matrix-valued differential equations. Putting the corresponding state and costate equations together, the following optimality system for cooperative decision strategies with risk aversion are summarized as follows. Theorem 3 Let .A; Bi / and .A; Ci / for i D 1; 2 be uniformly stabilizable and detectable. Suppose that ui ./ D Ki ./xO i ./ 2 Ui ; the common state and local measurement processes are defined by (3)–(5); and the decentralized filters with Li ./ are governed by (7). Then cooperative decision and control strategies u1 ./ and u2 ./ with risk aversion supported by the optimal pairs .K1 ./; L1 .// and .K2 ./; L2 .// are given by " K1 .t/

D

R11 .t/B1T .t/

I0T

k X

r Hr .t/ P .T t/.I0 I1 / C I2T

rD1

#

P .T t/.I2 I1 / "

( L1 .t/

D

I1T

k X rD1

I1T

k X rD1

r Hr .t/

rD1

.I0 I1 /T P .T t/.I0 I1 /

1

(73)

# ) 1 2rŠ H .t/P .T t/Hrs .t/ I1

r sŠ.r s/Š s rD2 sD1

k X

r Hr .t/C

k X

r1 X

r Hr .t/ P .T t/I1 C1T .t/V11

(74)

326

K.D. Pham and M. Pachter

and K2 .t/

" D

R21 .t/B2T .t/

I0T

k X

r Hr .t/ P .T t/.I0 I2 / C I1T

rD1

#

P .T t/.I1 I2 / ( L2 .t/

D

I2T

k hX

r Hr .t/C

rD1

I2T

k X

k X

r Hr .t/

rD1

1 .I0 I2 /T P .T t/.I0 I2 /

k X rD2

r

r1 X sD1

i 2rŠ Hs .t/P .T t/Hrs .t/ I2 sŠ.r s/Š

r Hr .t/ P .T t/I2 C2T .t/V21

(75) ) 1

(76)

rD1

where the optimal state solutions fHr ./gkrD1 supporting all the statistics for performance robustness and risk-averse decisions are governed by the forwardin-time matrix-valued differential equations with the terminal-value conditions H1 .0/ D NO T and Hr .0/ D 0 for 2 r k d H .t/ D .FO /T .t/H1 .t/ C H1 .t/FO .t/ C NO .t/ dt 1 d H .t/ D .FO /T .t/Hr .t/ C Hr .t/FO .t/ dt r C

r1 X

2rŠ Hs .t/GO .t/WO .GO /T .t/Hrs .t/ sŠ.r s/Š sD1

(77)

(78)

and the optimal costate solution P ./ satisfies the backward-in-time matrix-valued differential equation with the terminal-value condition P .T / D z0 zT0 d P .t/ D FO .t/P .t/ P .t/.FO /T .t/ GO .t/WO .GO /T .t/ : dt

(79)

Remark 1. The results herein are certainly viewed as the generalization of those obtained from [9], where with respect to the subject of performance robustness, most developed work has fundamentally focused on the first-order assessment of performance variations through statistical averaging of performance measures of interest. To obtain the optimal values for cooperative control strategies, a twopoint boundary value problem involving matrix differential equations must be solved. Moreover, the states fHr ./ gkrD1 and costates P ./ play an important role in the determination of cooperative decision strategies with risk aversion. Not only Ki ./ and Li ./ for i D 1; 2 are tightly coupled. They also depend on the mathematical statistics associated with performance uncertainty; in particular,

Information Considerations in Multi-Person Cooperative Control...

327

mean, variance, skewness, etc. The need for the decision laws of cooperative strategies to take into account accurate estimations of performance uncertainty is one form of interaction between two interdependent functions of a decision strategy: (1) anticipation of performance uncertainty and (2) proactive decisions for mitigating performance riskiness. This form of interaction between these two decision strategy functions gives rise to what are now termed as performance probing and performance cautioning and thus are explicitly concerned in optimal statistical control of stochastic large-scale multi-agent systems [5, 6].

6 Conclusions A new cooperative solution concept proposed herein is aimed at analytically addressing performance robustness, which is widely recognized as the pressing need in management control of stochastic multi-agent systems. One might consider typical applications in integrated situational awareness and socioeconomic problems in which the manager of an information-gathering department assigns his datacollecting group of people to perform such tasks as collect data, conduct polls, or research statistics so that an accurate forecast regarding future trends of the entire organization or agency can be carried out. In the most basic framework of performance-information analysis, a performance-information system transmits messages about higher-order characteristics of performance uncertainty to cooperative agents for use in future adaption of risk-averse decisions. The messages of performance-measure statistics transmitted are then influenced by the attributes of the interactive decision setting. Performance-measure statistics are now expected to work not only as feedback information for future risk-averse decisions but also as an influence mechanism for cooperative agents’ behaviors. The solution of a matrix two-point boundary value problem will yield the optimal parameter values of cooperative decision strategies. Furthermore, the implementation of the analytical solution can be computationally intensive. Henceforth, the basic concept of successive approximation and thus a sequence of suboptimal control functions will be the emerging subject of future research investigation.

References 1. 2. 3. 4.

Pollatsek, A., Tversky, A.: Theory of risk. J. Math. Psychol. 7, 540–53 (1970) Luce, R.D.: Several possible measures of risk. Theory Decis. 12, 217–228 (1980) Radner, R.: Team decision problems. Ann. Math. Stat. 33, 857–881 (1962) Sandell, N.R. Jr., Varaiya, P., Athans, M., Safonov, M.G.: A survey of decentralized control methods for large-scale systems. IEEE Trans. Automat. Contr. 23, 108–129 (1978) 5. Pham, K.D.: New results in stochastic cooperative games: strategic coordination for multiresolution performance robustness. In: Hirsch, M.J., Pardalos, P.M., Murphey, R., Grundel, D. (eds.) Optimization and Cooperative Control Strategies. Series Lecture Notes in Control and Information Sciences, vol. 381, pp. 257–285 (2008)

328

K.D. Pham and M. Pachter

6. Pham, K.D.: Performance-information analysis and distributed feedback stabilization in large-scale interconnected systems. In: Hirsch, M.J., Pardalos, P.M., Murphey, R. (eds.) Dynamics of Information Systems Theory and Applications Series: Springer Optimization and Its Applications, vol. 40, pp. 45–81. Springer, New York (2010). DOI:10.1007/978-1-4419-5689-7 3 7. Athans, M.: The matrix minimum prinicple. Inform. Contr. 11, 592–606. Elsevier (1967) 8. Brockett, R.W.: Finite Dimensional Linear Systems. Wiley, New York (1970) 9. Chong, C.Y.: On the stochastic control of linear systems with different information sets. IEEE Trans. Automat. Contr. 16(5), 423–430 (1971)

Modeling Interactions in Complex Systems: Self-Coordination, Game-Theoretic Design Protocols, and Performance Reliability-Aided Decision Making Khanh D. Pham and Meir Pachter

Abstract The subject of this research article is concerned with the development of approaches to modeling interactions in complex systems. A complex system contains a number of decision makers, who put themselves in the place of the other: to build a mutual model of other decision makers. Different decision makers have different influence in the sense that they will have control over—or at least be able to influence—different parts of the environment. Attention is first given to process models of operations among decision makers, for which the slow and fastcore design is based on a singularly perturbed model of complex systems. Next, self-coordination and Nash game-theoretic formulation are fundamental design protocols, lending themselves conveniently to modeling self-interest interactions, from which complete coalition among decision makers is not possible due to hierarchical macrostructure, information, or process barriers. Therefore, decision makers make decisions by assuming the others try to adversely affect their objectives and terms. Individuals will be expected to work in a decentralized manner. Finally, the standards and beliefs of the decision makers are threefold: (i) a high priority for performance-based reliability is made from the start through a means of performance-information analysis; (ii) a performance index has benefit and risk

The views expressed in this article are those of the authors and do not reflect the official policy or position of the United States (U.S.) Air Force, Department of Defense, or U.S. Government. K.D. Pham Air Force Research Laboratory, Space Vehicles Directorate, Kirtland Air Force Base, New Mexico 87117, USA e-mail: [email protected]

M. Pachter () Air Force Institute of Technology, Department of Electrical and Computer Engineering, Wright-Patterson Air Force Base, Ohio 45433, USA e-mail: [email protected] 329 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 17, © Springer Science+Business Media New York 2012

330

K.D. Pham and M. Pachter

awareness to ensure how much of the inherent or design-in reliability actually ends up in the developmental and operational phases; and (iii) risk-averse decision policies towards potential interference and noncooperation from the others. Keywords Fast and slow interactions • Mutual modeling • Self-coordination • Performance-measure statistics • Risk-averse control decisions • Performance reliability • Minimax estimation • Stochastic Nash games • Dynamic programming

1 Introduction Today, a new view of business operations, including sales, marketing, manufacturing, and design as inherently complex, computational, and adaptive systems, has been emerging. Complex systems are composed of intelligent adaptive decision makers constrained and enabled by their locations in networks linking decision makers and knowledge and by the tasks, in which they are engaged. Some of the techniques for dealing with the size and complexity of these complex systems are modularity, distribution, abstraction, and intelligence. Combining these techniques implies the use of intelligent, distributed modules—the concept of multi-model strategies for large-scale stochastic systems introduced in [1]. Therein, it was shown that in order to obtain near equilibrium Nash strategies, the decision makers need only to solve two decoupled low-order systems: a stochastic control problem in the fast time scale at local levels and a joint slow game problem with finitedimensional state estimators. This is accomplished by leveraging the multi-model situation wherein each decision maker needs to model only his local dynamics and some aggregated dynamics of the rest of the system. The intention of this research article is to extend the results [1] for two-person nonzero-sum Linear Quadratic Gaussian (LQG) Nash games, to robust decision making for multiperson quadratic decision problems toward performance values and risks. When measuring performance reliability, statistical analysis for probabilistic nature of performance uncertainty is relied on as part of the long-range assessment of reliability. One of the most widely used measures for performance reliability is the statistical mean or average to summarize the underlying performance variations. However, other aspects of performance distributions that do not appear in most of the existing progress are variance, skewness, and so forth. For instance, it may nevertheless be true that some performance with negative skewness appears riskier than performance with positive skewness when expectation and variance are held constant. If skewness does, indeed, play an essential role in determining the perception of risk, then the range of applicability of the present theory for stochastic control and operations research should be restricted, for example, to symmetric or equally skewed performance-measures. Thus, for reliability reasons on performance distributions, the research investigation herein is unique when compared to the existing literature and results.

Modeling Interactions in Complex Systems

331

Specifically, technical merits and research contributions include an effective integration of performance-information analysis into risk-averse strategy selection for performance robustness and reliability requirements so that: (i) intrinsic performance variations caused by stationary environments are addressed concurrently with other performance requirements and (ii) trade-off analysis on performance benefits and risks directly evaluates the impact of reliability as well as other performance requirements. Hence, via higher-order performance-measure statistics and adaptive decision making, it is anticipated that future performance variations will lose the element of surprise due to the inherent property of selfenforcing and risk-averse decision solutions that are highly capable of reshaping probabilistic performance distributions at both macro- and microlevels. The outline of this research begins with Sects. 2 and 3 that deal with subject of how to formulate complex systems with multiple time scales and autonomous decision makers. Section 4 considers self-coordination, by which the procedure for controlling fast timescale behavior with stabilizing feedback and risk-averse decision policies addresses multi-level performance robustness. Section 5 also presents a robust procedure for analyzing noncooperative modes of slow timescale interactions and for designing Nash equilibrium actions. Finally, a summary and remarks are given in Sect. 6.

2 Setting the Scene Before going into a formal presentation, it is necessary to consider some conceptual notations. To be specific, for a given Hilbert space X with norm jj jjX , 1 p 1, and a; b 2 R such that a b, a Banach space is defined as p follows LF .a; bI X / , f./ D f.t; !/ W a t bg such that ./ is an X -valued Rb p Ft -measurable process on Œa; b with Ef a jj.t; !/ jjX dtg < 1g with the norm Rb p jj./jjF ;p , .Ef a jj.t; !/jjX dtg/1=p , where the elements ! of the filtered sigma field Ft of a sample description space ˝ that is adapted for the time horizon Œa; b are random outcomes or events. Also, the Banach space of X -valued continuous functionals on Œa; b with the max-norm induced by jj jjX is denoted by C.a; bI X /. The deterministic version and its associated norm are written as Lp .a; bI X / and jj jjp . To understand the evolutions of complex systems, system dynamic approaches and models are excellent tools for simulating and exploring evolving processes. Herein, a strongly coupled slow-core process with the initial-value state x0 .t0 / D x00 0 dx0 .t/ D @A0 x0 .t/ C

N X j D1

A0j xj .t/ C

N X j D1

1 B0j uj .t/A dt C G0 dw.t/ ;

(1)

332

K.D. Pham and M. Pachter

where the constant coefficients A0 2 Rn0 n0 , A0j 2 Rn0 nj , B0j 2 Rn0 mj , G0 2 Rn0 p0 , while N weakly coupled fast-core processes with the constant coefficients Ai 0 2 Rni n0 , Ai i 2 Rni ni , Aij 2 Rni nj , Bi i 2 Rmi mi , and Gi 2 Rni p0 0 "i dxi .t/ D @Ai 0 x0 .t/ C Ai i xi .t/ C

N X

1 "ij Aij xj .t/ C Bi i ui .t/A dt C

p

"i Gi dw.t/

j D1;j ¤i

xi .t0 / D xi 0 ;

i D 1; : : : ; N

(2)

are proposed to account for the pairing of mutual influence with temporal features, by which N decision makers are now capable of dynamically coordinating their activities and cooperating with others. Each decision maker i is assumed to be acting autonomously and so making decisions about what to do at engagement time through information sampling and exchanges available locally dy0i .t/ D .C0i x0 .t/ C Ci xi .t// dt C dv0i .t/; i D 1; : : : ; N p p dyi i .t/ D "i Ci 0 x0 .t/ C Ci i xi .t/ dt C "i dvi i .t/ :

(3) (4)

Furthermore, all decision makers operate within local environments modeled by the filtered probability spaces that are defined with p0 , q0i , and qi i -dimensional stationary Wiener processes adapted for Œt0 ; tf together with the correlations of independent increments for all ; 2 Œt0 ; tf ˚ E Œw./ w./Œw./ w./T D W j j; W > 0 ˚ E Œv0i ./ v0i ./Œv0i ./ v0i ./T D V0i j j; V0i > 0 ˚ E Œvi i ./ vi i ./Œvi i ./ vi i ./T D Vi i j j; Vi i > 0: The small singular perturbation parameters "i > 0 for i D 1; : : : ; N represent different time constants, masses, etc., which help to account for decision makers’ responsiveness to internal and external changes from their environments as well as their inertia and stability over time. Other small regular perturbation parameters "ij are weak coupling between the decision makers. Note that each decision maker now has his/her own observations (3) and (4), makes his/her own admissible decisions ui 2 Ui L2F .t0 ; tf I Rmi /, and has his/her own unique history of interactions (2) with fast states xi 2 L2F .t0 ; tf I Rni /. The coefficient matrices Ai i are also assumed to be invertible. For a practical purpose, p the "i factor is further inserted to both process and observation noise terms to ensure the fast variables xi physically meaningful for control and estimation purposes. A more complete discussion about the use and justification of this practice can be found in [2, 3].

Modeling Interactions in Complex Systems

333

3 Multi-Model Generation So far, there has been nothing of how decision makers can work together. In this section, decision makers in the complex system are active in interpreting events and subsequently motivating appropriate responses to these events. In this sense, decision maker i decides to continue or discontinue relations with others. For example, decision maker i may choose to neglect the fast dynamics of decision makers j and the weak interconnections between the fast timescale processes; for example, by setting "j D 0 on the left hand side of (2) and "ij D 0 in (2). For any j D 1; : : : ; N and j ¤ i , the long-term behavior or steady-state dynamics of neighboring decision makers j is then given by x j .t/dt D A1 jj

p Aj 0 x0 .t/ C Bjj uj .t/ dt C "j Gj dw.t/ :

(5)

As mentioned in [3], the result (5) turns out to be as valid inputs to the slow timescale process (1). Viewed from the mutual influence of one decision maker to those of others, self-coordination preferred by decision maker i is hence described by a simplified model whose dynamical states x0i 2 L2F .t0 ; tf I Rn0 / and xii 2 L2F .t0 ; tf I Rni /, resulted from the substitution of the stochastic process (5) into those of (1) and (2) 0 dx0i .t/ D @Ai0 x0i .t/ C A0i xii .t/C

N X

1 i B0j uj .t/ C B0i ui .t/A dt C G0i dw.t/

j D1;j ¤i

(6)

p "i dxii .t/ D Ai 0 x0i .t/ C Ai i xii .t/ C Bi i ui .t/ dt C "i Gi dw.t/ ;

(7)

where the initial-value states x0i .t0 / x00 and xii .t0 / xi 0 , while the coefficients P 1 i 1 i are given by Ai0 , A0 N j D1;j ¤i A0j Ajj Aj 0 , B0j , B0j A0j Ajj Bjj , and G0 , PN p 1 G0 j D1;j ¤i "j A0j Ajj Gj . With the simplified model (6) and (7) in mind, decision maker i can bring his/her activities into coordination with the activities of others via his/her aggregate observations yii 2 L2F .t0 ; tf I Rqi 0 Cqi i / "

dyii .t/

#

x0i .t/ dt C dvi .t/ xii .t/ D Ci s x0i .t/ C Di s ui .t/ dt C dvi s .t/;

D

C0i Ci 0

Ci p1 Ci i "i

i D 1; : : : ; N

(8)

# p dy0i dv0i dv0i "i Ci A1 i i Gi dw , , dvi , , dvi s , , p1 dyi i dvi i Ci i A1 dvi i "i i i Gi dw " " # # 1 1 C0i Ci Ai i Ai 0 Ci Ai i Bi i Ci s , , and Di s , . 1 p Ci 0 p1"i Ci i A1 A C A1 Bi i i0 ii "i i i i i "

provided that dyii

334

K.D. Pham and M. Pachter

Fig. 1 A two-level structure for online dynamic coordination

Under such the simplified model (6) and (7) being used by those decision makers, the entire group of N decision makers may work as a team with each one fitting in, where he/she thinks his/her effort will be most effective and will interfere least with the others. Occasionally decision makers interact at the slow timescale level; but most of the adjustments take place silently and without deliberation at the fast timescale levels. All these situations, where self-coordination is possible, require that each decision maker be able to possess the knowledge of the parameters associated with the simplified model (6) and (7). With references to the work [1], a two-level structure, as shown in Fig. 1 for online dynamic coordination, is adapted with appropriate paradigms for estimate observations and decision making with risk aversion. In particular, the individual assessment of the alternatives available is obtained by solving 2N low-order problems: N independent optimal statistical control problems for each decision maker at the fast timescale level; and N constrained stochastic Nash games at the slow timescale level.

Modeling Interactions in Complex Systems

335

4 Fast Interactions Short horizon interactions are now concerned with establishing a framework for information analysis and performance-risk bearing decisions that permit consequences anticipated on performance reliability for the decision makers in charge of local fast operations within stochastic environments p "i dxif .t/ D Ai i xif .t/ C Bi i uif dt C "i Gi dw.t/; dyi if D Ci i xif .t/dt C dvi i .t/;

i D 1; : : : ; N

xif .t0 / D xi 0 f fast.

(9) (10)

Yet, the decision makers attempt to make risk-bearing decisions uif from the admissible sets Uif L2F .t0 ; tf I Rmi / for reliable attainments of integral-quadratic utilities; for instance, Jif W Rni Uif 7! RC with the rules of action f

Jif .xi 0 ; uif / D "i xifT .tf /Qif xif .tf / Z tf h i C xifT ./Qif xif ./ C uTif ./Rif uif ./ d :

(11)

t0

f

The design-weighting matrices Qif 2 Rni ni , Qif 2 Rni ni , and Rif 2 Rmi mi are real, symmetric, and positive semidefinite with Rif invertible. The relative “size” of Qif and Rif enforces trade-offs between the speed of response and the size of the control decision. At this point, it is convenient to use the Kalman-like estimates xO if 2 L2F .t0 ; tf I Rni / with the initial state estimates xO if .t0 / D xi 0 , Kalman gain Lif .t/ , Pif .t/CiTi Vi1 i , and the estimate-error covariances Pif 2 C 1 .t0 ; tf I Rni ni / with the initial-value conditions Pif .t0 / D 0 for i D 1; : : : ; N "i dxO if .t / D Ai i xO if .t / C Bi i uif .t / dt C Pif .t /CiTi Vi1 O if .t /dt / i .dyi if .t / Ci i x (12) "i

d T Pif .t / D Pif .t /ATii C Ai i Pif .t / Pif .t /CiTi Vi1 i Ci i Pif .t / C Gi W Gi dt

(13)

to approximately describe the future evolution of the fast timescale process (9) when different control decision processes applied. From (13), the covariance of error estimates is independent of decision action and observations. Therefore, to parameterize the conditional densities p.xif .t/jFt / and i D 1; : : : ; N , the conditional mean xO if .t/ minimizing error-estimate covariance of xif .t/ is only needed. Thus, a family of decision policies is chosen of the form: if W if 7! Uif , uif D if .if /, and if , t; xO if .t/ . Since the quadratic decision problem (9) and (11) is of interest, the search for closed-loop feedback decision laws is then restricted within the strategy space, which permits a linear feedback synthesis uif .t/ , Kif .t/xO if .t/ ;

for i D 1; : : : ; N

(14)

336

K.D. Pham and M. Pachter

wherein the elements of Kif .t/ 2 C.t0 ; tf I Rmi ni / represent admissible fast timescale decision gains defined in some appropriate sense. Moreover, the pairs .Ai i ; Bi i / and .Ai i ; Ci i / for i D 1; : : : ; N are assumed to be stabilizable and detectable, respectively. Under this assumption, such feedback and filter gains Kif ./ and Lif ./ exist so that the aggregate system dynamics is exponentially stable. The following result provides a representation of riskiness from the standpoint of higher-order characteristics pertaining to probabilistic performance distributions with respect to the underlying stochastic environment. This representation also has significance at the level of decision making, where risk-averse courses of action originate. Theorem 1 (Fast Interactions—Performance-measure Statistics). For fast interactions governed by (9) and (11), the pairs .Ai i ; Bi i / and .Ai i ; Ci i / are stabilizable and detectable. Then, for any given kif 2 N, the kif th cumulant associated with the performance-measure (11) for decision maker i is given as follows: k

ifif D xiT0 Hif11 .t0 ; kif /xi 0 C Dif .t0 ; kif /;

i D 1; : : : ; N;

k

k

(15) k

if if if , fHif12 .˛; r/grD1 , fHif21 .˛; r/grD1 , where all the cumulant variables fHif11 .˛; r/grD1

k

k

if if and fDif .˛; r/grD1 evaluated at ˛ D t0 satisfy the matrix and fHif22 .˛; r/grD1 scalar-valued differential equations (with the dependence of Hif11 .˛; r/, Hif12 .˛; r/, Hif21 .˛; r/, Hif22 .˛; r/, and Dif .˛; r/ upon the admissible Kif suppressed)

d 11 11 H .˛; r/ D Fif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif21 .˛/; Kif .˛// d˛ if d 12 12 H .˛; r/ D Fif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif22 .˛/; Kif .˛// d˛ if d 21 21 H .˛; r/ D Fif;r .˛; Hif11 .˛/; Hif21 .˛/; Hif22 .˛/; Kif .˛// d˛ if d 22 22 H .˛; r/ D Fif;r .˛; Hif12 .˛/; Hif21 .˛/; Hif22 .˛// d˛ if d Dif .˛; r/ D Gif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif21 .˛/; Hif22 .˛// ; d˛

(16) (17) (18) (19) (20)

f

where the terminal-value conditions Hif11 .tf ; 1/ D "i Qif , Hif11 .tf ; r/ D 0 for 2 r

f

kif ; Hif12 .tf ; 1/ D "i Qif , Hif12 .tf ; r/ D 0 for 2 f

r kif ; Hif21 .tf ; 1/ D "i Qif , Hif21 .tf ; r/ D 0 for 2 r kif ; f

Hif22 .tf ; 1/ D "i Qif , Hif22 .tf ; r/ D 0 for 2 r kif ; and Dif .tf ; r/ D 0 for 1 r

kif . Furthermore, all the kif -tuple variables Hif11 .˛/ ,

.Hif11 .˛; 1/; : : : ; Hif11 .˛; kif .Hif21 .˛; 1/; : : : ; Hif21 .˛; kif

//; Hif12 .˛/ , .Hif12 .˛; 1/; : : : ; Hif12 .˛; kif //; Hif21 .˛/ , //; and Hif22 .˛/ , .Hif22 .˛; 1/; : : : ; Hif22 .˛; kif //.

Modeling Interactions in Complex Systems

337

Proof. With the interest of space limitation, the proof is omitted. Interested readers are referred to the Appendix and [4] for the mathematical definitions of the mappings governing the right members of (16)–(20) and in-depth development, respectively. To anticipate for a well-posed optimization problem that follows, some sufficient conditions for the existence of solutions to the cumulant-generating equations (16)–(20) in the calculation of performance-measure statistics are now presented in the sequel. Theorem 2 (Fast Interactions—Existence of Performance-Measure Statistics). Let .Ai i ; Bi i / and .Ai i ; Ci i / be stabilizable and detectable. Then, any given any given kif 2 N, the time-backward matrix and scalar-valued differential equations k

k

if if (16)–(20) admit unique and bounded solutions fHif11 .˛; r/grD1 , fHif12 .˛; r/grD1 ,

k

k

k

if if if , fHif22 .˛; r/grD1 , and fDif .˛; r/grD1 on Œt0 ; tf . fHif21 .˛; r/grD1

Proof. With references to stabilizable and detectable assumptions, there always exist some feedback decision gains Kif 2 C.t0 ; tf I Rmi ni / and filter gains Lif 2 C .t0 ; tf I Rni qi i / so that composite state matrices FAi i CBi i Kif 2 C.t0 ; tf I Rni ni / and FAi i Lif Ci i 2 C.t0 ; tf I Rni ni / are exponentially stable on Œt0 ; tf . Therefore, if

if

the state transition matrices ˚Ai i CBi i Kif .t; t0 / and ˚Ai i Lif Ci i .t; t0 / associated with if

FAi i CBi i Kif .t/ and FAi i Lif Ci i .t/ have the properties: limtf !1 jj˚Ai i CBi i Kif .tf ; /jj D Rt if 0 and limtf !1 t0f jj˚Ai i CBi i Kif .tf ; /jj2 d < 1. By the matrix variation of constant formula, the unique and time-continuous solutions to the (16)–(20) can if if be expressed in terms of ˚Ai i CBi i Kif .t; t0 / and ˚Ai i Lif Ci i .t; t0 /. As long as the growth rate of the integrals is not faster than the exponentially decreasing rate of if if two factors of ˚Ai i CBi i Kif .t; t0 / and ˚Ai i Lif Ci i .t; t0 /, it is then concluded that there k

if , exist upper bounds on the unique and time-continuous solutions fHif11 .˛; r/grD1

k

k

k

k

if if if if , fHif21 .˛; r/grD1 , fHif22 .˛; r/grD1 , and fDif .˛; r/grD1 for any time fHif12 .˛; r/grD1 interval Œt0 ; tf .

Remark 1. Notice that the solutions Hif11 .˛/, Hif12 .˛/, Hif21 .˛/, Hif22 .˛/, and Dif .˛/ of the (16)–(20) depend on the admissible decision gain Kif of the feedback decision law (14) by decision makers i for i D 1; : : : ; N . In the sequel and elsewhere, when this dependence is needed to be clear, then the notations Hif11 .˛; Kif /, Hif12 .˛; Kif /, Hif21 .˛; Kif /, Hif22 .˛; Kif /, and Dif .˛; Kif / should be used to denote the solution trajectories of the dynamics (16)–(20) with the given feedback decision gain Kif . Next, the components of 4kif -tuple Hif and kif -tuple Dif variables are defined by k k C1 2k 2k C1 3k 3k C1 4k Hif , H1if ; : : : ; Hifif ; Hifif : : : ; Hif if ; Hif if ; : : : ; Hif if ; Hif if ; : : : ; Hif if D .Hif11 .; 1/; : : : ; Hif11 .; kif /; Hif12 .; 1/; : : : ; Hif12 .; kif /; Hif21 .; 1/; : : : ; Hif22 .; kif //

338

K.D. Pham and M. Pachter

and k

1 ; : : : ; Difif / Dif , .Dif

D .Dif .; 1/; : : : ; Dif .; kif //: Henceforth, the product systems of dynamical equations (16)–(20), whose respec11 11 12 12 Fif;k , Fif12 , Fif;1 Fif;k , Fif21 , tive mappings Fif11 , Fif;1 if if

21 21 22 22 Fif;1 Fif;k , Fif22 , Fif;1 Fif;k , and Gif , Gif;1 Gif;kif are if if

defined on Œt0 ; tf .Rni ni /4kif Rmi ni and Œt0 ; tf .Rni ni /4kif in the optimal statistical control with dynamical output feedback, become d f Hif .˛/ D Fif .˛; Hif .˛/; Kif .˛// ; Hif .tf / D Hif ; d˛ d f Dif .˛/ D Gif .˛; Hif .˛// ; Dif .tf / D Dif ; d˛

(21) (22)

under the definition Fif , Fif11 Fif12 Fif21 Fif22 together with the aggregate terminal-value conditions f

f

f

f

Hif , "i Qif 0 …0 "i Qif 0 … 0 "i Qif 0 …0 „ ƒ‚ „ ƒ‚ „ ƒ‚ .kif 1/-times .kif 1/-times .kif 1/-times f

… 0: Dif , 0„ ƒ‚ kif -times

Given the evidences on surprises of utilities and preferences that now support the knowledge and beliefs of performance riskiness, all decision makers hence form rational expectations about the future and make decisions on the basis of this knowledge and these beliefs. Definition 1 (Fast Interactions—Risk-Value Aware Performance Index). As defined herein, the optimal statistical control consists in determining risk-averse decision uif to minimize the new performance index if0 , which is defined on a subset of ft0 g .Rni ni /kif .Rkif / such that if0 ,

k

k

C 2if if2 C C ifif ifif ; 1if if1 „ƒ‚… „ ƒ‚ … Standard Measure Risk Measures

(23)

r r where the rth order performance-measure statistics ifr ifr .t0 ; Hif .t0 /; Dif T r r if r .t0 // D xi 0 Hif .t0 /xi 0 C Dif .t0 / for 1 r kif and the sequence D fif

k

if with 1if > 0. Parametric design measures rif considered here represent 0grD1 different emphases on higher-order statistics and prioritizations by decision maker i toward robust performance and risk sensitivity.

Modeling Interactions in Complex Systems

339

Remark 2. This multi-objective performance index is interpreted as a linear combination of the first kif performance-measure statistics of the integral-quadratic utility (11), on the one hand, and a value and risk model, on the other, to reflect the trade-offs between performance benefits and risks. From the above definition, it is clear that the statistical problem is an initial-cost problem, in contrast with the more traditional terminal-cost class of investigations. One may address an initial cost problem by introducing changes of variables, which convert it to a terminal-cost problem. This modifies the natural context of the optimal statistical control, however, which it is preferable to retain. Instead, one may take a more direct dynamic programming approach to the initial-cost problem. Such an approach is illustrative of the more general concept of the principle of optimality, an idea tracing its roots back to the seventeenth century. The development in the sequel is motivated by the excellent treatment in [5] and is intended to follow it closely. Because [5] embodies the traditional endpoint problem and corresponding use of dynamic programming, it is necessary to make appropriate modifications in the sequence of results, as well as to introduce the terminology of the optimal statistical control. f f Let the terminal time tf and states .Hif ; Dif / be given. Then, the other end 0 0 ; Dif / are specified by a condition involved the initial time t0 and state pair .Hif target set requirement. 0 0 O if , where the ; Dif /2 M Definition 2 (Fast Interactions—Target Sets). .t0 ; Hif O if and i D 1; : : : ; N , is a closed subset defined by Œt0 ; tf target set M .Rni ni /4kif Rkif . f f if For the given terminal data .tf ; Hif ; Dif /, the class KO

f

f

tf ;Hif ;Dif Iif

of admissible

feedback gain is defined as follows. Definition 3 (Fast Interactions—Admissible Fedback Gains). Let the compact subset Kif Rmi ni be the set of allowable gain values. For the given kif 2 N and kif if with 1if > 0, let KO be the class of the sequence if D frif 0grD1 f f if tf ;Hif ;Dif I

C.Œt0 ; tf I Rmi ni / with values Kif ./ 2 Kif , for which the performance index (23) is finite and for which the trajectory solutions to the dynamic equations (21) and 0 0 O if . (22) reach .t0 ; Hif ; Dif /2M Now, the optimization problem is to minimize the risk-value aware performance if index (23) over all admissible feedback gains Kif D Kif ./ in KO . f f if tf ;Hif ;Dif I

Definition 4 (Fast Interactions—Optimization of Mayer Problem). Suppose kif that kif 2 N and the sequence if D frif 0grD1 with 1if > 0 are fixed. Then, the control optimization with output-feedback information pattern is given by if0 t0 ; Hif .t0 ; Kif /; Dif .t0 ; Kif / ; min O if Kif ./2K

f f tf ;Hif ;Dif Iif

subject to the dynamical equations (21) and (22) on Œt0 ; tf .

340

K.D. Pham and M. Pachter

It is important to recognize that the optimization considered here is in Mayer form and can be solved by applying an adaptation of the Mayer form verification theorem of dynamic programming as given in [5]. To embed the aforementioned optimization f f into a larger optimal control problem, the terminal time and states .tf ; Hif ; Dif / are parameterized as ."; Yif ; Zif /. Thus, the value function for this optimization problem is now depending on the terminal condition parameterizations. Definition 5 (Fast Interactions—Value Function). Suppose that ."; Yif ; Zif / 2 Œt0 ; tf .Rni ni /4kif Rkif is given and fixed. Then, the value function Vif ."; Yif ; Zif / is defined by Vif ."; Yif ; Zif / ,

inf if Kif ./ 2 KO ";Y

if

;Zif Iif

if0 t0 ; Hif .t0 ; Kif /; Dif .t0 ; Kif / : if

For convention, Vif ."; Yif ; Zif / , 1 when KO ";Y ;Z Iif is empty. To avoid cumif if bersome notation, the dependence of trajectory solutions on Kif ./ is suppressed. Next, some candidates for the value function are constructed with the help of the concept of reachable set. Definition 6 (Fast Interactions—Reachable Set). Let the reachable set QO if and i D 1; : : : ; N be n o if QO if , ."; Yif ; Zif / 2 Œt0 ; tf .Rni ni /4kif Rkif W KO ";Y ;Z Iif ¤ ; : if

if

Notice that QO if contains a set of points ."; Yif ; Zif /, from which it is possible to O if with some trajectory pairs corresponding to a continuous reach the target set M decision gain. Furthermore, the value function must satisfy both a partial differential inequality and an equation at each interior point of the reachable set, at which it is differentiable. Theorem 3 (Fast Interactions—Hamilton–Jacobi–Bellman (HJB) Equation). Let ."; Yif ; Zif / be any interior point of the reachable set QO if , at which the scalarvalued function Vif ."; Yif ; Zif / is differentiable. Then Vif ."; Yif ; Zif / satisfies the partial differential inequality 0

@ @ Vif ."; Yif ; Zif / C Vif ."; Yif ; Zif /vec.Fif ."; Yif ; Kif // @" @vec.Yif / C

@ Vif ."; Yif ; Zif /vec.Gif ."; Yif // @vec.Zif /

for all Kif 2 Kif and vec./ the vectorizing operator of enclosed entities.

(24)

Modeling Interactions in Complex Systems

341

if If there is an optimal feedback decision gain Kif in KO ";Y ;Z Iif , then the partial if if differential equation of dynamic programming ( @ Vif ."; Yif ; Zif /vec.Fif ."; Yif ; Kif // 0 D min Kif 2Kif @vec.Yif / ) @ @ Vif ."; Yif ; Zif /vec.Gif ."; Yif // C Vif ."; Yif ; Zif / C @vec.Zif / @" (25)

is satisfied. The minimum in (25) is achieved by the optimal feedback decision gain Kif ."/ at ". Proof. Interested readers are referred to the mathematical details in [6]. The verification theorem in the optimal statistical control notation is stated as follows. Theorem 4 (Fast Interactions—Verification Theorem). Fix kif 2 N and let Wif ."; Yif ; Zif / be a continuously differentiable solution of the HJB equation (25), which satisfies the boundary Wif ."; Yif ; Zif / D if0 ."; Yif ; Zif / for some O if . Let .tf ; Hf ; Df / be a point of QO if , let Kif be a feedback ."; Yif ; Zif / 2 M if decision gain in KO

if

f

f

tf ;Hif ;Dif Iif

if

and let Hif , Dif be the corresponding solutions

of the (21) and (22). Then, Wif .˛; Hif .˛/; Dif .˛// is a non-increasing function if defined on Œt0 ; tf with of ˛. If Kif is a feedback decision gain in KO f f if tf ;Hif ;Dif I

and Dif of the preceding equations such that, for the corresponding solutions Hif ˛ 2 Œt0 ; tf ,

0D

@ Wif .˛; Hif .˛/; Dif .˛// @" @ Wif .˛; Hif .˛/; Dif .˛//vec.Fif .˛; Hif .˛/; Kif .˛/// C @vec.Yif / C

@ Wif .˛; Hif .˛/; Dif .˛//vec.Gif .˛; Hif .˛/// ; @vec.Zif /

then Kif is an optimal feedback decision gain in KO

if

f

f

tf ;Hif ;Dif Iif

(26)

and Wif ."; Yif ; Zif /

D Vif ."; Yif ; Zif /, where Vif ."; Yif ; Zif / is the value function. Proof. The detailed analysis can be found in the work by the first author [6]. Recall that the optimization problem being considered herein is in Mayer form, which can be solved by an adaptation of the Mayer form verification theorem. Thus, f f the terminal time and states .tf ; Hif ; Dif / are parameterized as ."; Yif ; Zif / for a

342

K.D. Pham and M. Pachter

family of optimization problems. For instance, the states (21) and (22) defined on the interval Œt0 ; " now have terminal values denoted by Hif ."/ Yif and Dif ."/ Zif , where " 2 Œt0 ; tf . Furthermore, with kif 2 N and ."; Yif ; Zif / in QO if , the following real-value candidate: Wif ."; Yif ; Zif / D xiT0

kif X

rif .Yifr C Eifr ."//xi 0 C

rD1

kif X

rif .Zifr C Tifr ."// (27)

rD1

for the value function is therefore differentiable. The time derivative of Wif ."; Yif ; Zif / can also be shown of the form kif

X d d r T r r Wif ."; Yif ; Zif / D xi 0 if Fif ."; Yif ; Kif / C Eif ."/ xi 0 d" d" rD1

C

kif X

rif

Gifr

rD1

d ."; Yif / C Tifr ."/ d"

where the time parameter functions Eifr 2 C 1 .Œt0 ; tf I Rni ni / and Tifr 2 C 1 .Œt0 ; tr I R/ are to be determined. At the boundary condition, it requires that W.t0 ; Yif .t0 /; Zif .t0 // D if0 .t0 ; Yif .t0 /; Zif .t0 // ; which leads to xiT0

kif X

rif .Yifr .t0 / C Eifr .t0 //xi 0 C

rD1

D xiT0

kif X

rif .Zifr .t0 / C Tifr .t0 //

rD1 kif X

rif Yifr .t0 /xi 0 C

rD1

kif X

rif Zifr .t0 /:

(28)

rD1

By matching the boundary condition (28), it yields the time parameter functions Eifr .t0 / D 0 and Tifr .t0 / D 0 for 1 r kif . Next, it is necessary to verify that this candidate value function satisfies (26) along the corresponding trajectories produced by the feedback gain Kif resulting from the minimization in (25). Or equivalently, one obtains ( kif kif X X T r r xi 0 0 D min if Fif ."; Yif ; Kif /xi 0 C rif Gifr ."; Yif / Kif 2Kif

rD1

rD1

kif

CxiT0

X rD1

) X d r r d r E ."/xi 0 C if Tif ."/ : d" if d" rD1 kif

rif

(29)

Modeling Interactions in Complex Systems

343

Therefore, the derivative of the expression in (29) with respect to the admissible feedback decision gain Kif yields the necessary conditions for an extremum of (25) on Œt0 ; tf , Kif ."; Yif / D

1 T Rif Bi i

kif X

O sif Yifs ;

i D 1; : : : ; N;

(30)

sD1

where O sif , rif =1if with 1if > 0. With the feedback decision gain (30) n okif evaluated on replaced in the expression of the bracket (29) and having Yifs sD1

the solution trajectories (21) and (22), the time-dependent functions Eifr ."/ and Tifr ."/ are therefore chosen such that the sufficient condition (26) in the verification theorem is satisfied in the presence of the arbitrary value of xi 0 ; for example d 1 1 1 E ."/ D .Ai i C Bi i Kif ."//T Hif ."/ C Hif ."/.Ai i C Bi i Kif ."// d" if C Qif C KifT ."/Rif Kif ."/ and for 2 r kif , d r r r E ."/ D .Ai i C Bi i Kif ."//T Hif ."/ C Hif ."/.Ai i C Bi i Kif ."// d" if r1 i h X 2rŠ k Cv f f v rv C ."/˘11 ."/ C Hifif ."/˘21 ."/ Hif ."/ Hif vŠ.r v/Š vD1 C

r1 X vD1

i 2k Crv h 2rŠ k Cv f f v ."/˘12 ."/ C Hifif ."/˘22 ."/ Hif if ."/ Hif vŠ.r v/Š

together with, for 1 r kif , n o n o d r k Cr f f r Tif ."/ D Tr Hif ."/˘11 ."/ C Tr Hifif ."/˘21 ."/ d" o n o n 2k Cr 3k Cr f f C Tr Hif if ."/˘12 ."/ C Tr Hif if ."/˘22 ."/ with the initial-value conditions Eifr .t0 / D 0 and Tifr .t0 / D 0 for 1 r kif . Therefore, the sufficient condition (26) of the verification theorem is satisfied so that the extremizing feedback decision gain (30) by decision maker i and i D 1; : : : ; N becomes optimal. Finally, the principal results of fast interactions are now summarized for linear, time-invariant stochastic systems with uncorrelated Wiener stationary distributions. For this case, the representation of performance-measure statistics has been exhibited and the risk-averse decision solutions specified.

344

K.D. Pham and M. Pachter

Theorem 5 (Fast Interactions—Fast-Timescale Risk-Averse Decisions). Consider fast interactions with the statistical control problem (9), (11), and (23) wherein .Ai i ; Bi i / and .Ai i ; Ci i / are stabilizable and detectable. Fix kif 2 N, and k

if if D frif 0grD1 with 1if > 0. Then, the risk-averse decision policy that minimizes the performance index (23) is exhibited in fast interactions by decision maker i for i D 1; : : : ; N

uif .t/ D Kif .t/xO if .t/; Kif

.˛/ D

1 T Rif Bi i

kif X

t , t0 C tf ˛; r O rif Hif .˛/;

˛ 2 Œt0 ; tf

O rif ,

rD1

rif

(31)

1if

where all the parametric design freedom through O rif represent different weights toward specific summary statistical performance-measures; that is, mean, variance, skewness, etc. chosen by decision maker i for his/her performance robustness. The kif r .˛/grD1 satisfy the coupled time-backward matrix-valued optimal solutions fHif f

1 differential equations with the terminal-value conditions Hif .tf / D "i Qif and r Hif .tf / D 0 when 2 r kif

d 1 1 H .˛/ D .Ai i C Bi i Kif .˛//T Hif .˛/ d˛ if 1 Hif .˛/.Ai i C Bi i Kif .˛// Qif .Kif /T .˛/Rif Kif .˛/

(32)

d r r H .˛/ D .Ai i C Bi i Kif .˛//T Hr if .˛/ Hif .˛/.Ai i C Bi i Kif .˛// d˛ if r1 i h X 2rŠ kif Cv f f Hv .˛/˘21 .˛/ Hrv .˛/ if .˛/˘11 .˛/ C Hif if vŠ.r v/Š vD1

i h 2rŠ kif Cv 2kif Crv f f Hv .˛/˘ .˛/ C H .˛/˘ .˛/ Hif .˛/ 12 22 if if vŠ.r v/Š vD1 r1 X

(33)

and the optimal auxiliary solutions

k Cr kif fHifif .˛/grD1

of the time-backward difk C1

ferential equations with the terminal-value conditions Hifif k Cr

Hifif

f

.tf / D "i Qif and

.tf / D 0 when 2 r kif

d kif C1 k C1 k C1 Hif .˛/ D .Ai i C Bi i Kif .˛//T Hifif .˛/ Hifif .˛/.Ai i Lif .˛/Ci i / d˛ H1 if .˛/.Lif .˛/Ci i / Qif

(34)

Modeling Interactions in Complex Systems

345

d kif Cr k Cr k Cr H .˛/ D .Ai i C Bi i Kif .˛//T Hifif .˛/ Hifif .˛/ d˛ if .Ai i Lif .˛/Ci i / r Hif .˛/Lif .˛/Ci i

r1 X

2rŠ vŠ.r v/Š vD1

i k Crv h k Cv f f v .˛/˘11 .˛/ C Hifif .˛/˘21 .˛/ Hifif .˛/ Hif

r1 X vD1

h 2rŠ f v Hif .˛/˘12 .˛/ vŠ.r v/Š k Cv

CHifif

2k Cr

and the optimal auxiliary solutions fHif if

i 3k Crv f .˛/˘22 .˛/ Hif if .˛/ k

if .˛/grD1 of the time-backward differ-

2k C1

ential equations with the terminal-value conditions Hif if 2k Cr

Hif if

(35)

f

.tf / D "i Qif and

.tf / D 0 when 2 r kif

d 2kif C1 2k C1 H .˛/ D .Ai i Lif .˛/Ci i /T Hif if .˛/ d˛ if 2k C1

Hif if

1 .˛/.Ai i C Bi i Kif .˛// .Lif .˛/Ci i /T Hif .˛/ Qif

(36) d 2kif Cr 2k Cr Hif .˛/ D .Ai i Lif .˛/Ci i /T Hif if .˛/ d˛ 2k Cr

Hif if

r1 X vD1

r .˛/.Ai i C Bi i Kif .˛// .Lif .˛/Ci i /T Hif .˛/

h 2rŠ 2k Cv f Hif if .˛/˘11 .˛/ vŠ.r v/Š 3k Cv

CHif if

r1 X vD1

i f rv .˛/˘21 .˛/ Hif .˛/

h 2rŠ 2k Cv f Hif if .˛/˘12 .˛/ vŠ.r v/Š 3k Cv

CHif if

i 2k Crv f .˛/˘22 .˛/ Hif if .˛/ (37)

346

K.D. Pham and M. Pachter 3k Cr

and finally the optimal auxiliary solutions fHif if

k

if .˛/grD1 of the time-backward

3k C1

differential equations with the terminal-value conditions Hif if 3k Cr

Hif if

f

.tf / D "i Qif and

.tf / D 0 when 2 r kif , d 3kif C1 3k C1 H .˛/ D .Ai i Lif .˛/Ci i /T Hif if .˛/ d˛ if 3k C1

Hif if

.˛/.Ai i Lif .˛/Ci i / k C1

Qif .Lif .˛/Ci i /T Hifif 2k C1

Hif if

.˛/

.˛/.Lif .˛/Ci i /

(38)

d 3kif Cr 3k Cr H .˛/ D .Ai i Lif .˛/Ci i /T Hif if .˛/ d˛ if 3k Cr

.˛/.Ai i Lif .˛/Ci i / .Lif .˛/Ci i /T Hifif

2k Cr

.˛/.Lif .˛/Ci i /

Hif if Hif if

r1 X vD1

k Cr

h 2rŠ 2k Cv f Hif if .˛/˘11 .˛/ vŠ.r v/Š 3k Cv

CHif if

r1 X vD1

.˛/

i k Crv f .˛/˘21 .˛/ Hifif .˛/

h 2rŠ 2k Cv f Hif if .˛/˘12 .˛/ vŠ.r v/Š 3k Cv

CHif if

i 3k Crv f .˛/˘22 .˛/ Hif if .˛/ (39)

where the Kalman gain Lif .t/ , Pif .t/CiTi Vi1 i is solved forwardly in time, "i

d T Pif .t/ D Pif .t/ATii C Ai i Pif .t/ Pif .t/CiTi Vi1 i Ci i Pif .t/ C Gi W Gi dt Pif .t0 / D 0 :

(40)

Remark 3. As it can be seen from (32)–(39), the calculation of the optimal feedback decision gain Kif ./ depends on the filter gain Lif ./ of the Kalman state estimator. Therefore, the design of optimal risk-averse decision control cannot be separated from the state estimation counterpart. In other words, the separation principle as often inherited in the LQG problem class is no longer applicable in this generalized class of stochastic control.

Modeling Interactions in Complex Systems

347

5 Slow Interactions As has been alluding to, self-coordination is possible when each decision maker knows his/her place in the scheme and is prepared to carry out his/her job with the others. A useful approach for understanding the self-coordination of complex systems is to focus on slow interactions. Herein slow interactions used to map and simulate engagements within and between communities of decision makers are therefore formulated by setting "i D 0 and "ij D 0 of the fast timescale processes (2). Thinking about mutual influence suggests the integration of steadystate dynamics of individual process (5) with the macro-level process (1) and flows of information (3) and (4). Specifically, a typical formulation for slow interactions (with s “slow”) is considered as follows: ! N X dx0s .t/ D A0s x0s .t/ C Bi s ui s .t/ dt C G0s dw.t/; x0s .t0 / D x00 (41) i D1 i where the constant coefficients A0s Ai0 , Bi s D B0i A0i A1 i i Bi i , and G0s G0 . As the slow timescale process is at work, decision maker i attempts to optimize his/her own performance. In fact, the long-term behavior or the steady-state dynamics (5) of decision maker i could yield some ill-defined terms like the integrals of the second-order statistics associated with the underlying Wiener stationary processes when substituting (5) into the utilities of decision makers, as have been well documented in [1]. However, these ill-defined terms are independent of the input decisions, ui s 2 Ui s L2F .t0 ; tf I Rmi /. For this reason, it is expected that the optimal decision law by decision maker i obtained by solving the modified utility but assuming the only drift effect of the long-term behavior (5), zi .t/ , A1 i i .Ai 0 x0s .t/ C Bi i ui s .t// and t 2 Œt0 ; tf , would be essentially the same as that obtained by solving the original utility except with the both diffusion and drift effects in (5). Henceforth, it requires that long-term performance, Ji s W Rn0 Ui s 7! RC concerning decision maker i , is measured for the impacts on slower events through the mappings f

T .tf /Q0i x0s .tf / Ji s .x00 ; ui s / D x0s Z tf T C x0s ./Q0i x0s ./ C zTi ./Qi zi ./ C uTis ./Ri ui s ./ d: t0

(42) f

The constant matrices Q0i 2 Rn0 n0 , Q0i 2 Rn0 n0 , Qi 2 Rni ni , and Ri 2 Rmi mi are real, symmetric, and positive semidefinite with Ri invertible. The relative “size” of Q0s , Qi , and Ri again enforces trade-offs between the speeds of slow and fast timescale responses and the size of the control decisions. Next, multiperson planning must take into consideration the fact that the activities of decision makers can interfere with one another. With respect to

348

K.D. Pham and M. Pachter

group interactions (41), decision maker i hence builds a model of other decision makers—their abilities, self-interest intentions, and the like—and to coordinate his/her activities around the predictions that this model makes dxi s .t/ D .A0s xi s .t/ C Bi s ui s .t//dt C ıi s .t/ C G0s dw.t/;

xi s .t0 / D x00 : (43)

Under the assumption of .A0s ; Ci s / detectable, decision maker i is able to make aggregate observations yi s 2 L2F .t0 ; tf I Rqi 0 Cqi i / according to the relation dyi s .t/ D .Ci s x0s .t/ C Di s ui s .t// dt C dvi s .t/;

i D 1; : : : ; N

(44)

where the aggregate observation noise vi s .t/ is an .qi 0 Cqi i /-dimensional stationary Wiener process, has correlation of independent ˚ which is uncorrelated with w.t/ and increments E Œvi s ./ vi s ./Œvi s ./ vi s ./T D Vi s j j with Vi s > 0 for all ; 2 Œt0 ; tf . Moreover, all other decision makers except for decision maker i are endowed with partial knowledge about his/her observation process, in which 1 1 Ci s and Di s , i Di s with scalars i s 2 RC Ci s , i s s dyQi s .t/ D .Ci s xi s .t/ C Di s ui s .t// dt C di s .t/

(45)

where the measurement noise i s .t/ is an .qi 0 C qi i /-dimensional stationary Wiener process that correlates correlation of ˚ with neither w.t/ nor vi s .t/, while its independent increments E Œi s ./ i s ./Œi s ./ i s ./T D Ni s j j with Ni s > 0 for all ; 2 Œt0 ; tf . As such, the perpetual signal and nominal driving term ıi s 2 L2F .t0 ; tf I Rn0 /, is generated and imposed by all neighbors around decision maker i ıi s .t/ D Li s .t/ ŒdyQi s .t/ .Ci s xO i s .t/ C Di s ui s .t// dt ;

(46)

from which the interference intensity Li s 2 C.t0 ; tf I Rn0 .qi 0 Cqi i / / is yet to be defined. For greater mathematical tractability, each decision maker i with selfinterest decides to retain an approximation of his/her group interactions via a model-reference estimator with filter estimates xO i s 2 L2F .t0 ; tf I Rn0 / and initial values xO i s .t0 / D x00 dxO i s .t/ D .A0s xO i s .t/CBi s ui s .t// dt C Li s .t/Œdyi s .t/ .Ci s xO i s .t/ C Di s ui s .t//dt (47) where the interaction estimate gain Li s 2 C.t0 ; tf I Rn0 .qi 0 Cqi i / / is determined in accordance with the minimax differential game subject to the aggregate interference Li s .t/di s .t/ for t 2 Œt0 ; tf from the group dxQ i s .t/ D .A0s Li s .t/Ci s C Li s .t/Ci s / xQ i s .t/dt CG0s dw.t/ Li s .t/dvi s .t/ C Li s .t/di s .t/;

xQ i s .t0 / D 0 :

(48)

Modeling Interactions in Complex Systems

349

The objective of minimax estimation is minimized by Li s and maximized by Li s as

Jies .Li s ; Li s / D Tr Mi s .tf / EfxQ i1s .tf /.xQ i1s /T .tf / xQ i2s .tf /.xQ i2s /T .tf /g

Z CTr

tf t0

Mi s ./ EfxQ i1s ./.xQ i1s /T ./ xQ i2s ./.xQ i2s /T ./g d

wherein the weighting Mi s 2 C.t0 ; tf I Rn0 n0 / for all the estimation errors is positive definite and the estimate errors xQ i1s 2 L2F .t0 ; tf I Rn0 / and xQ i2s 2 L2F .t0 ; tf I Rn0 / with the initial values xQ i1s .t0 / D 0 and xQ i2s .t0 / D 0 satisfy the stochastic differential equations dxQ i1s .t/ D .A0s Li s .t/Ci s C Li s .t/Ci s / xQ i1s .t/dt C G0s dw.t/ Li s .t/dvi s .t/ dxQ i2s .t/ D .A0s Li s .t/Ci s C Li s .t/Ci s / xQ i2s .t/dt C Li s .t/di s .t/ provided the assumption of xQ i s .t/ , xQ i1s .t/ C xQ i2s .t/ with the constraint (48). As originally shown in [7], the differential game with estimation interference possesses a saddle-point equilibrium .Li s ; Li s / such that Jies .Li s ; Li s / Jies .Li s ; Li s / Jies .Li s ; Li s / is satisfied when decision maker i and the remaining group searg min e lect their strategies Li s D Ji s .Li s ; Li s / D Pi s .t/CiTs and Li s D Li s arg max e T J .L ; Li s / D Pi s .t/Ci s subject to estimate-error covariances Pi s 2 Li s i s i s C 1 .t0 ; tf I Rn0 n0 / satisfying Pi s .t0 / D 0 d T T Pi s .t/ D A0s Pi s .t/C Pi s .t/AT0s C G0s W G0s Pi s .t/.CiTs Ci s Ci s Ci s /Pi s .t/: dt (49) Thus far, the risk-bearing decisions of individual decision makers have been considered only in fast interactions. But it is also possible to respond to risk in slow interactions as well. Here, when it comes to decisions under uncertainty, it is not immediately evident how a ranking of consequences leads to an ordering of actions, since each action will simply imply a chi-squared probabilistic mix of performance whose description (42) is now rewritten conveniently for the sequel analysis f

Ji s .x00 I ui s / D xiTs .tf /Q0i s xi s .tf / Z tf T C xi s ./Q0i s xi s ./ C 2xiTs ./Qi s ui s ./ t0

C uTis ./Ri s ui s ./ d

(50)

350

K.D. Pham and M. Pachter

T 1 wherein the constant weighting matrices Q0i s , Q0i C .A1 i i Ai 0 / Qi .Ai i Ai 0 /, f 1 1 1 T 1 Qi s , .Ai i Ai 0 /Qi .Ai i Bi i /, Ri s , Ri C .Ai i Bi i / Qi .Ai i Bi i /, and Q0i s , f Q0i . Having been dissatisfied with the perceived level of utility risk, individual decision maker decides to construct his/her action repertoire. The objective for each decision maker is the reliable attainment of his/her own utility and preferences (50) by choosing appropriate decision strategies for the underlying linear dynamical system (43) and its approximation (47) and (48). The noncooperative aspect ıi s governed by (46) implies that the other decision makers have been assumed not to collaborate in trying to attain this goal reliably for decision maker i . Depending on the information i s and the set of strategies i s the decision makers like to choose from, the actions of the decision makers are then determined by the relations; that is, i s W i s 7! Ui s and ui s D i s .i s /. Henceforth, the performance value of (50) and its robustness depend on the information i s that decision maker i has for interactions and his/her strategy space. Furthermore, the performance distribution of (50) obviously also depends for each decision maker i on the pursued actions ıi s of the other decision makers. With interests of mutual modeling and self-direction, each decision maker no longer needs prior knowledge of the remaining decision makers’ decisions and thus cannot be certain of how the other decision makers select their pursued actions. It is reasonable to assume that decision maker i may instead choose to optimize his/her decision and performance against the worst possible set of decision strategies, which the other decision makers could choose. Henceforth, it is assumed that decision makers are constrained to use minimax-state estimates xO i s .t/ for their responsive decision implementation. Due to the fact that the interaction model (47) and (48) is linear and the path-wise performance-measure (50) is quadratic, the information structure for optimal decisions is now considered to be linear. Therefore, it is reasonable to restrict the search for the optimal decision laws to linear time-varying decision feedback laws generated from the minimax-state estimates xO i s .t/. That is, i s , .t; xO i s .t// and i s , fui s .t/ D i s .t; xO i s .t// and ui s 2 Ui s g for i D 1; : : : ; N . In view of the common knowledge (47) and state-decision coupling utility (50), it is reasonable to construct probing decisions that can bring to bear additional information about expected performance and its certainty according to the relation

ui s .t/ , Ki s .t/xO i s .t/ C pi s .t/ ;

i D 1; : : : ; N

(51)

wherein the admissible slow timescale decision gain Ki s 2 C.t0 ; tf I Rmi n0 / and affine slow timescale correction pi s 2 C.t0 ; tf I Rmi / are to be determined in some appropriate sense. What next are the aggregate interactions (47) and (48) by decision maker i with self-interest, which come from the implementation of action (51) dzi s .t/ D .Fi s .t/zi s .t/ C li s .t//dt C Gi s .t/dwi s .t/ ;

zi s .t0 / D z0is

(52)

Modeling Interactions in Complex Systems

351

where the aggregate system states, parameters, and process disturbances are given by " zi s ,

xO i s xQ i s

" Fi s ,

"

# ; zi s .t0 / ,

3 3 2 w W 0 0 7 7 6 6 ; li s ; wi s , 4 vi s 5 ; Wi s , 4 0 Vi s 0 5 i s 0 0 Ni s " # # 0 Li s Li s Ci s 0 ; Gi s , G0s Li s Li s Li s Ci s C Li s Ci s

x00 0

A0s C Bi s Ki s 0 A0s

#

"

Bi s pi s 0

#

EfŒwi s ./ wi s ./Œwi s ./ wi s ./T g D Wi s j j ;

2

8; 2 Œt0 ; tf :

Then, for given admissible affine pi s and feedback decision Ki s , the performancemeasure (42) is seen as the “cost-to-go,” Ji s .˛; z˛is / when parameterizing the initial condition .t0 ; z0is / to any arbitrary pair .˛; z˛is / f

Ji s .˛; z˛is / D zTis .tf /Oi s zi s .tf / Z tf T C zi s ./Oi s ./zi s ./ C 2zTis ./Ni s ./ ˛

wherein

CpiTs ./Ri s pi s ./ d

(53)

" # f f KiTs Ri s pi s C Qi s pi s Qi 0 Qi 0 f ; Oi s , Ni s , f f Q i s pi s Qi 0 Qi 0 Q0i s C KiTs Ri s Ki s C 2Qi s Ki s Q0i s : Oi s , Q0i s C 2Qi s Ki s Q0i s

So far there are two types of information, i.e., process information (52) and goal information (53) have been given in advance to the control decision policy (51). Since there is the external disturbance wi s ./ affecting the closed-loop performance, the control decision policy now needs additional information about performance variations. This is coupling information and thus also known as performance information. The questions of how to characterize and influence performance information are then answered by adaptive cumulants (aka semi-invariants) associated with the performance-measure (53) in details below. Associated with each decision maker i , the first and second characteristic functions or the moment and cumulant-generating functions of (53) are defined by ˚ 'i s ˛; z˛is I i s , E exp i s Ji s ˛; z˛is (54) ˛ ˚ ˛ (55) i s ˛; zi s I i s , ln 'i s ˛; zi s I i s for some small parameters i s in an open interval about 0 while lnfg denotes the natural logarithmic transformation of the first characteristic function.

352

K.D. Pham and M. Pachter

Theorem 6 (Slow Interactions—cumulant-Generating Function). Let i s be a small positive parameter and ˛ 2 Œt0 ; tf be a running variable. Further let 'i s ˛; z˛is I i s D %i s .˛I i s / expf.z˛is /T i s .˛I i s /z˛is C 2.z˛is /T i s .˛I i s /g (56) i s .˛I i s / D lnf%i s .˛I i s /g ;

i D 1; : : : ; N

(57)

Under the assumption of .A0s ; Bi s / and .A0s ; Ci s / stabilizable and detectable, the cumulant-generating function that compactly and robustly represents the uncertainty of performance distribution (53) is given by ˛ i s .˛; zi s I i s /

D .z˛is /T i s .˛I i s /z˛is C 2.z˛is /T i s .˛I i s / C i s .˛I i s /

(58)

subject to d

i s .˛I i s / D FiTs .˛/ i s .˛I i s / i s .˛I i s /Fi s .˛/ i s Oi s .˛/ d˛ f

2 i s .˛I i s /Gi s .˛/Wi s GiTs .˛/ i s .˛I i s /; i s .tf I i s / D i s Oi s (59) d i s .˛I i s / D FiTs .˛/i s .˛I i s / i s .˛I i s /li s .˛/ i s Ni s .˛/ d˛ i s .tf I i s / D 0

(60)

d i s .˛I i s / D Trf i s .˛I i s /Gi s .˛/Wi s GiTs .˛/g 2Tis .˛I i s /li s .˛/ d˛ i s piTs .˛/Ri s pi s .˛/ ;

i s .tf I i s / D 0 :

(61)

Proof. For shorthand notations, it is convenient to let the first characteristic function denoted by $i s .˛; z˛is I i s / , expf i s Ji s .˛; z˛is /g. The moment-generating function becomes 'i s .˛; z˛is I i s / D Ef$i s .˛; z˛is I i s /g with time derivative of d 'i s .˛; z˛is I i s / d˛ D i s .z˛is /T Oi s .˛/z˛is C 2.z˛is /T Ni s .˛/ C piTs .˛/Ri s pi s .˛/ 'i s .˛; z˛is I i s / : Using the standard Ito’s formula, one gets d'i s .˛; z˛is I i s / D Efd$i s .˛; z˛is I i s /g D

@ @ 'i s .˛; z˛is I i s /d˛ C ˛ 'i s .˛; z˛is I i s / Fi s .˛/z˛is C li s .˛/ d˛ @˛ @zi s

1 @2 ˛ T 'i s .˛; zi s I i s /Gi s .˛/Wi s Gi s .˛/ d˛ C Tr 2 @.z˛is /2

Modeling Interactions in Complex Systems

353

when combined with (56) leads to i s .z˛is /T Oi s .˛/z˛is C 2.z˛is /T Ni s .˛/ C piTs .˛/Ri s pi s .˛/ 'i s .˛; z˛is I i s / ( d %i s .˛I i s / d d D d˛ C .z˛is /T

i s .˛I i s /z˛is C 2.z˛is /T i s .˛I i s / %i s .˛I i s / d˛ d˛ C .z˛is /T i s .˛I i s /Fi s .˛/z˛is C .z˛is /T FiTs .˛/ i s .˛I i s /z˛is C 2.z˛is /T i s .˛I i s /li s .˛/ C 2.z˛is /T FiTs .˛/i s .˛I i s / ˚ C 2Tis .˛I i s /li s .˛/ C Tr i s .˛I i s /Gi s .˛/Wi s GiTs .˛/ ) C 2.z˛is /T i s .˛I i s /Gi s .˛/Wi s GiTs .˛/ i s .˛I i s /z˛is 'i s .˛; z˛is I i s /: (62) To have all terms in (62) to be independent of arbitrary z˛is , it requires the matrix, vector, and scalar-valued differential equations (59)–(61) with the terminal-value conditions hold true. t u By definition, the mathematical statistics associated with (53) that provide performance information for the decision process taken by decision maker i can best be generated by the MacLaurin series expansion of the cumulant-generating function (58) ˛ i s .˛; zi s I i s / ,

1 X ki s D1

D

1 X ki s D1

iksi s

. i s /ki s ki s Š

@.ki s / @. i s /.ki s /

ˇ ˇ

˛ ˇ i s .˛; zi s I i s /ˇ

i s D0

. i s /ki s ki s Š

(63)

in which iksi s ’s are called the performance-measure statistics associated with decision maker i for i D 1; : : : ; N . Notice that the series coefficients in (63) are identified as ˇ ˇ ˇ ˇ @.ki s / @.ki s / ˛ ˛ T ˇ ˇ .˛; z I / D .z /

.˛I / z˛is is is ˇ is is ˇ i s i s .k / .k / is @. i s / i s @. / i s i s D0 i s D0 ˇ .ki s / ˇ @ ˛ T C 2.zi s / i s .˛I i s /ˇˇ @. i s /.ki s / i s D0 ˇ .ki s / ˇ @ C i s .˛I i s /ˇˇ : (64) .k / i s @. i s / i s D0

354

K.D. Pham and M. Pachter

For notational convenience, the necessary definitions are introduced as follows: ˇ ˇ ˇ ˇ @.kis / @.kis / ˇ M Hi s .˛; ki s / ,

i s .˛I i s /ˇ ; Di s .˛; ki s / , .˛I i s /ˇˇ .kis / i s @. i s /.kis / @. / is is D0 is D0 ˇ .kis / ˇ @ Di s .˛; ki s / , i s .˛I i s /ˇˇ @. i s /.kis / is D0 which leads to iksi s D .z˛is /T Hi s .˛; ki s /z˛is C 2.z˛is /T DM i s .˛; ki s / C Di s .˛; ki s /: The result below contains a tractable method of generating performance-measure statistics that provides measures of the amount, value, and the design of performance information structures in time domain. This computational procedure is preferred to that of (64) for the reason that the cumulant-generating equations (59)–(61) now allow the incorporation of classes of linear feedback strategies in the statistical control problems. Theorem 7 (Slow Interactions—Performance-Measure Statistics). Assume interaction dynamics by decision maker i and i D 1; : : : ; N is described by (52) and (53) in which the pairs .A0s ; Bi s / and .A0s ; Ci s / are stabilizable and detectable. For ki s 2 N fixed, the ki s th statistics of performance-measure (53) is given by iksi s D .z˛is /T Hi s .˛; ki s /z˛is C 2.z˛is /T DM i s .˛; ki s / C Di s .˛; ki s /:

(65)

is is where the cumulant-generating solutions fHi s .˛; r/gkrD1 , fDM i s .˛; r/gkrD1 , and ki s fDi s .˛; r/grD1 evaluated at ˛ D t0 satisfy the time-backward matrix differential equations (with the dependence upon Ki s .˛/ and pi s .˛/ suppressed)

d Hi s .˛; 1/ D FiTs Hi s .˛; 1/ Hi s .˛; 1/Fi s .˛/ Oi s .˛/ d˛ d Hi s .˛; r/ D FiTs Hi s .˛; r/ Hi s .˛; r/Fi s .˛/ d˛

r1 X sD1

(66)

2rŠ Hi s .˛; s/Gi s .˛/Wi s GiTs .˛/Hi s .˛; r s/ ; sŠ.r s/Š

2 r ki s

(67)

and d M Di s .˛; 1/ D FiTs .˛/DM i s .˛; 1/ Hi s .˛; 1/li s .˛/ Ni s .˛/ d˛ d M Di s .˛; r/ D FiTs .˛/DM i s .˛; r/ Hi s .˛; r/li s .˛/ ; 2 r ki s d˛

(68) (69)

Modeling Interactions in Complex Systems

355

and finally ˚ d Di s .˛; 1/ D Tr Hi s .˛; 1/Gi s .˛/Wi s GiTs .˛/ d˛ 2.DM i s /T .˛; 1/li s .˛/ piTs .˛/Ri s pi s .˛/

(70)

˚ d Di s .˛; r/ D Tr Hi s .˛; r/Gi s .˛/Wi s GiTs .˛/ d˛ 2.DM i s /T .˛; r/li s .˛/ ; 2 r ki s

(71)

f

where the terminal-value conditions are Hi s .tf ; 1/ D Oi s , Hi s .tf ; r/ D 0 for 2 r ki s , DM i s .tf ; r/ D 0 for 1 r ki s , and Di s .tf ; r/ D 0 for 1 r ki s . Proof. The expression of performance-measure statistics (65) is readily justified by using the result (64). What remains is to show that the solutions Hi s .˛; r/, DM i s .˛; r/, and Di s .˛; r/ for 1 r ki s indeed satisfy the dynamical equations (66)– (71). In fact the equations (66)–(71), which are satisfied by the solutions Hi s .˛; r/, DM i s .˛; r/, and Di s .˛; r/ can be obtained by repeatedly taking time derivatives with respect to i s of the supporting equations (59)–(61) together with the assumption of t u .A0s ; Bi s / and .A0s ; Ci s / stabilizable and detectable on t0 ; tf . Remark 4. It is worth the time to observe that this research investigation focuses on the class of optimal statistical control problems whose performance index reflects the intrinsic performance variability introduced by process noise stochasticity. It should also not be forgotten that all the performance-measure statistics (65) depend in part on the initial condition zi s .˛/. Although different states zi s .t/ and t 2 Œ˛; tf will result in different values for the “performance-to-come” (53), the performancemeasure statistics are, however, the functions of time-backward evolutions of the cumulant-generating solutions Hi s .˛; r/, DM i s .˛; r/, and Di s .˛; r/ that totally ignore all the intermediate values zi s .t/. This fact therefore makes the new optimization problem as being considered in optimal statistical control particularly unique, as compared with the more traditional dynamic programming class of investigations. In other words, the time-backward trajectories (66)–(71) should be considered as the “new” dynamical equations for the optimal statistical control, from which the resulting Mayer optimization [5] and associated value function in the framework of dynamic programming therefore depend on these “new” states Hi s .˛; r/, DM i s .˛; r/, and Di s .˛; r/; not the classical states zi s .t/ as in the traditional school of thinking. In the design of a decision process in which the information process about performance variations is embedded with Ki s and pi s , it is convenient to rewrite the results (66)–(71) in accordance of the following matrix and vector partitions: 11 11 M Hi s .; r/ Hi12 s .; r/ ; M i s .; r/ D Di s .; r/ D Hi s .; r/ D 22 Hi21 DM i21s .; r/ s .; r/ Hi s .; r/ s s ˘11 ./ ˘12 ./ Gi s ./Wi s GiTs ./ D s s ./ ˘22 ./ ˘21

356

K.D. Pham and M. Pachter

s s s s provided that the shorthand notations ˘11 D Li s Vi s .Li s /T , ˘12 D ˘21 D ˘11 , s T T T and ˘22 D G0s W G0s CLi s Vi s .Li s / CLi s Ni s .Li s / ; wherein the second-order statistics associated with the .q0i C qi i /-dimensional stationary Wiener process vi s is given by

p V0i C "i .Ci A1 Gi /W .Ci A1 Gi /T "i .Ci A1 Gi /W .Ci i A1 Gi /T i i i i i i i i : Vi s D 1 T 0 Vi i C .Ci i A1 i i Gi /W .Ci i Ai i Gi /

For notational simplicity, ki s -tuple variables Hi11s ./, Hi12s ./, Hi21s ./, Hi22s ./, DM i11s ./, DM 21 ./, and Di s ./ are introduced as the new dynamical states for decision maker i is

11 Hi11s ./ , .Hi11s;1 ./; : : : ; Hi11s;ki s .// .Hi11 s .; 1/; : : : ; Hi s .; ki s // 12 Hi12s ./ , .Hi12s;1 ./; : : : ; Hi12s;ki s .// .Hi12 s .; 1/; : : : ; Hi s .; ki s // 21 Hi21s ./ , .Hi21s;1 ./; : : : ; Hi21s;ki s .// .Hi21 s .; 1/; : : : ; Hi s .; ki s // 22 Hi22s ./ , .Hi22s;1 ./; : : : ; Hi22s;ki s .// .Hi22 s .; 1/; : : : ; Hi s .; ki s //

DM i11s ./ , .DM i11s;1 ./; : : : ; DM i11s;ki s .// .DM i11s .; 1/; : : : ; DM i11s .; ki s // DM i21s ./ , .DM i21s;1 ./; : : : ; DM i21s;ki s .// .DM i21s .; 1/; : : : ; DM i21s .; ki s // Di s ./ , .Di s;1 ./; : : : ; Di s;ki s .// .Di s .; 1/; : : : ; Di s .; ki s // which are satisfying the matrix, vector, and scalar-valued differential equations (66)–(71). Furthermore, the right members of the matrix, vector, and scalar-valued differential equations (66)–(71) are considered as the mappings on the Œt0 ; tf with the rules of action 11 12 21 T 11 Fi11 s;1 .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// , .A0s C Bi s Ki s .˛// Hi s .˛; 1/ T Hi11 s .˛; 1/.A0s C Bi s Ki s .˛// Q0i s Ki s .˛/Ri s Ki s .˛/ 2Qi s Ki s .˛/

(72)

when 2 r ki s 11 12 21 Fi11 s;r .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// 11 , .A0s C Bi s Ki s .˛//T Hi11 s .˛; r/ Hi s .˛; r/.A0s C Bi s Ki s .˛// r1 X vD1

11 11 2rŠ s s Hi s .˛; v/˘11 .˛/ C Hi12 s .˛; v/˘21 .˛/ Hi s .˛; r v/ vŠ.r v/Š

r1 X vD1

21 11 2rŠ s s .˛/ C Hi12 Hi s .˛; v/˘12 s .˛; v/˘22 .˛/ Hi s .˛; r v/ (73) vŠ.r v/Š

Modeling Interactions in Complex Systems

357

11 12 22 Fi12 s;1 .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// 11 , .A0s C Bi s Ki s .˛//T Hi12 s .˛; 1/ Hi s .˛; 1/.Li s .˛/Ci s / Hi12 s .˛; 1/.A0s Li s .˛/Ci s C Li s .˛/Ci s / Q0i s

(74)

when 2 r ki s 11 12 22 T 12 Fi12 s;r .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// , .A0s C Bi s Ki s .˛// Hi s .˛; r/ 12 Hi11 s .˛; r/.Li s .˛/Ci s / Hi s .˛; r/.A0s Li s .˛/Ci s C Li s .˛/Ci s /

r1 X vD1

r1 X vD1

11 12 2rŠ s s Hi s .˛; v/˘11 .˛/ C Hi12 s .˛; v/˘21 .˛/ Hi s .˛; r v/ vŠ.r v/Š 11 22 2rŠ s s Hi s .˛; v/˘12 .˛/ C Hi12 s .˛; v/˘22 .˛/ Hi s .˛; r v/ (75) vŠ.r v/Š

11 21 22 Fi21 s;1 .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// , Q0i s 2Qi s Ki s .˛/

.A0s Li s .˛/Ci s C Li s .˛/Ci s /T Hi21 s .˛; 1/ T 11 Hi21 s .˛; 1/.A0s C Bi s Ki s .˛// .Li s .˛/Ci s / Hi s .˛; 1/

(76)

when 2 r ki s 11 21 22 21 Fi21 s;1 .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// , Hi s .˛; r/.A0s C Bi s Ki s .˛// T 11 .A0s Li s .˛/Ci s C Li s .˛/Ci s /T Hi21 s .˛; r/ .Li s .˛/Ci s / Hi s .˛; r/

r1 X vD1

r1 X vD1

21 11 2rŠ s s Hi s .˛; v/˘11 .˛/ C Hi22 s .˛; v/˘21 .˛/ Hi s .˛; r v/ vŠ.r v/Š 21 21 2rŠ s s Hi s .˛; v/˘12 .˛/ C Hi22 s .˛; v/˘22 .˛/ Hi s .˛; r v/ (77) vŠ.r v/Š

12 21 22 T 12 Fi22 s;1 .˛; Hi s .˛/; Hi s .˛/; Hi s .˛// , .Li s .˛/Ci s / Hi s .˛; 1/

.A0s Li s .˛/Ci s C Li s .˛/Ci s /T Hi22 s .˛; 1/ Q0i s 21 Hi22 s .˛; 1/.A0s Li s .˛/Ci s C Li s .˛/Ci s / Hi s .˛; 1/.Li s .˛/Ci s / (78)

when 2 r ki s 12 21 22 T 12 Fi22 s;r .˛; Hi s .˛/; Hi s .˛/; Hi s .˛// , .Li s .˛/Ci s / Hi s .˛; r/

.A0s Li s .˛/Ci s C Li s .˛/Ci s /T Hi22 s .˛; r/

358

K.D. Pham and M. Pachter 21 Hi22 s .˛; r/.A0s Li s .˛/Ci s C Li s .˛/Ci s / Hi s .˛; r/.Li s .˛/Ci s /

r1 X vD1

r1 X vD1

21 12 2rŠ s s Hi s .˛; v/˘11 .˛/ C Hi22 s .˛; v/˘21 .˛/ Hi s .˛; r v/ vŠ.r v/Š 21 22 2rŠ s s Hi s .˛; v/˘12 .˛/ C Hi22 s .˛; v/˘22 .˛/ Hi s .˛; r v/ (79) vŠ.r v/Š

T M 11 M 11 GM i11s;1 .˛; Hi11 s .˛/; Di s .˛/; Ki s .˛/; pi s .˛// , .A0s C Bi s Ki s .˛// Di s .˛; 1/ T Hi11 s .˛; 1/Bi s pi s .˛/ Ki s .˛/Ri s pi s .˛/ Qi s pi s .˛/

(80)

when 2 r ki s T M 11 M 11 GM i11s;r .˛; Hi11 s .˛/; Di s .˛/; Ki s .˛/; pi s .˛// , .A0s C Bi s Ki s .˛// Di s .˛; r/

Hi11 s .˛; r/Bi s pi s .˛/

(81)

T M 11 M 11 M 21 GM i21s;1 .˛; Hi21 s .˛/; Di s .˛/; Di s .˛/; pi s .˛// , .Li s .˛/Ci s / Di s .˛; 1/

.A0s Li s .˛/Ci s CLi s .˛/Ci s /TDM i21s .˛; 1/Hi21 s .˛; 1/Bi s pi s .˛/Qi s pi s .˛/ (82) when 2 r ki s T M 11 M 11 M 21 GM i21s;r .˛; Hi21 s .˛/; Di s .˛/; Di s .˛/; pi s .˛// , .Li s .˛/Ci s / Di s .˛; r/

.A0s Li s .˛/Ci s C Li s .˛/Ci s /T DM i21s .˛; r/ Hi21 s .˛; r/Bi s pi s .˛/

(83)

12 21 22 M 11 Gi s;1 .˛; Hi11 s .˛/; Hi s .˛/; Hi s .˛/; Hi s .˛/; Di s .˛/; pi s .˛// ˚ ˚ 12 s s , 2.DM i11s .˛; 1//T Bi s pi s .˛/ Tr Hi11 s .˛; 1/˘11 .˛/ C Tr Hi s .˛; 1/˘21 .˛/ ˚ 22 ˚ s s T (84) Tr Hi21 s .˛; 1/˘12 .˛/ C Tr Hi s .˛; 1/˘22 .˛/ pi s .˛/Ri s pi s .˛/

when 2 r ki s 12 21 22 M 11 Gi s;r .˛; Hi11 s .˛/; Hi s .˛/; Hi s .˛/; Hi s .˛/; Di s .˛/; pi s .˛// ˚ ˚ 12 s s , 2.DM i11s .˛; r//T Bi s pi s .˛/ Tr Hi11 s .˛; r/˘11 .˛/ C Tr Hi s .˛; r/˘21 .˛/ ˚ ˚ 22 s s Tr Hi21 (85) s .˛; r/˘12 .˛/ C Tr Hi s .˛; r/˘22 .˛/ :

The product system of the dynamical equations (66)–(71), whose mappings are constructed by the Cartesian products of the constituents of (72)–(85), for example, 11 11 12 12 12 21 21 21 Fi11 s , Fi s;1 Fi s;ki s , Fi s , Fi s;1 Fi s;ki s , Fi s , Fi s;1 Fi s;ki s , 22 Fi22 F 22 , GMi11s , GM 11 GM 11 , GMi21s , GM 21 GM 21 , s , F i s;1

i s;ki s

i s;1

i s;ki s

i s;1

i s;ki s

Modeling Interactions in Complex Systems

359

and Gi s , Gi s;1 Gi s;ki s in the optimal statistical control with output-feedback compensation, is described by d 11 11 12 21 H .˛/ D Fi11 Hi11s .tf / (86) s .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// ; d˛ i s d 12 11 12 22 Hi12s .tf / (87) H .˛/ D Fi12 s .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// ; d˛ i s d 21 11 21 22 H .˛/ D Fi21 Hi21s .tf / (88) s .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// ; d˛ i s d 22 12 21 22 H .˛/ D Fi22 Hi22s .tf / (89) s .˛; Hi s .˛/; Hi s .˛/; Hi s .˛// ; d˛ i s d M 11 (90) D .˛/ D GMi11s .˛; Hi11s .˛/; DM i11s .˛/; Ki s .˛/; pi s .˛// ; DM i11s .tf / d˛ i s d M 21 (91) D .˛/ D GMi21s .˛; Hi21s .˛/; DM i11s .˛/; DM i21s .˛/; pi s .˛// ; DM i21s .tf / d˛ i s d Di s .˛/ D Gi s .˛; Hi11s .˛/; Hi12s .˛/; Hi21s .˛/; Hi22s .˛/; DM i11s .˛/; pi s .˛// ; Di s .tf / d˛ (92) wherein the terminal-value conditions Hi11s .tf / D Hi12s .tf / D Hi21s .tf / D f Hi22s .tf / , Q0i 0 0, DM i11s .tf / D DM i21s .tf / , 0„ ƒ‚ …0, and DM i s .tf / , „ ƒ‚ … ki s -times ki s -times 0 0 . „ ƒ‚ … ki s -times As for the problem statements of the control decision optimization concerned by decision maker i , the product systems (86)–(92) of the dynamical equations (66)– 12 21 22 (71) are now further described in terms of Fi s , Fi11 s Fi s Fi s Fi s and 11 21 GMi s , GM GM is

is

d Hi s .˛/ D Fi s .˛; Hi s .˛/; Ki s .˛// ; Hi s .tf / d˛ d M DM i s .tf / Di s .˛/ D GMi s .˛; Hi s .˛/; DM i s .˛/; Ki s ; pi s .˛// ; d˛ d Di s .˛/ D Gi s .˛; Hi s .˛/; DM i s .˛/; pi s .˛// ; Di s .tf / d˛

(93) (94) (95)

whereby the terminal-value conditions Hi s .tf / , .Hi11s .tf /; Hi12s .tf /; Hi21s .tf /; Hi22s .tf //, and DM i s .tf / , .DM i11s .tf /; DM i21s .tf //. Recall that the aim is to determine risk-bearing decision ui s so as to minimize the performance vulnerability of (53) against all sample-path realizations of the underlying stochastic environment wi s . Henceforth, performance risks are interpreted

360

K.D. Pham and M. Pachter

as worries and fears about certain undesirable characteristics of performance distributions of (53) and thus are proposed to manage through a finite set of selective weights. This custom set of design freedoms representing particular uncertainty aversions decision maker i is hence different from the ones with aversion to risk captured in risk-sensitive optimal control [8, 9]; just to name a few. Definition 7 (Slow Interactions—Risk-Value Aware Performance Index). With reference to Li s and Li s being conducted optimally, the new performance index for slow interactions; that is, i0s W ft0 g .Rn0 n0 /ki s .Rn0 /ki s Rki s 7! RC with ki s 2 N is defined as a multi-criteria objective using the first ki s performancemeasure statistics of the integral-quadratic utility (53), on the one hand, and a value and risk model, on the other, to reflect the trade-offs between reliable attainments and risks i0s ,

1is i1s C 2is i2s C C ki si s iksi s „ƒ‚… „ ƒ‚ … Standard Measure Risk Measures

(96)

where the rth performance-measure statistics irs irs .t0 ; Hi s .t0 /; DM i s .t0 /; Di s T T M 11 .t0 // D x00 Hi11s;r .t0 /x00 C 2x00 Di s;r .t0 / C Di s;r .t0 /, while the dependence of Hi s , M Di s , and Di s on certain admissible Ki s and pi s is omitted for notational simplicity. is In addition, parametric design measures ris from the sequence i s D fris 0gkrD1 1 with i s > 0 concentrate on various prioritizations as chosen by decision maker i toward his/her trade-offs between performance robustness and high performance demands. To specifically indicate the dependence of the risk-value aware performance index (96) expressed in Mayer form on ui s and the set of interferences from all other decision makers ıi s , the multi-criteria objective (96) for decision maker i is now rewritten as i0s .ui s I ıi s /. In view of this multiperson decision problem, a noncooperative Nash equilibrium ensures that no decision makers have incentive to unilaterally deviate from the equilibrium decisions in order to further optimize their performance. Henceforth, a Nash game-theoretic framework is suitable to capture the nature of conflicts as actions of a decision maker are tightly coupled with those of other remaining decision makers. Definition 8 (Slow Interactions—Nash Equilibrium). An admissible set of actions .u1s ; : : : ; uN s / is a Nash equilibrium for an N -person stochastic game where each decision maker i and i D 1; : : : ; N has the performance index i0s .ui s I ıi s / of Mayer type, if for all admissible .u1s ; : : : ; uN s / the following inequalities hold: 0 i0s .ui s I ıi s / i s .ui s I ıi s /;

i D 1; : : : ; N:

When solving for a Nash equilibrium solution, it is very important to realize that N decision makers have different performance indices to minimize. A standard approach for a potential solution from the set of N inequalities as stated above is

Modeling Interactions in Complex Systems

361

to solve jointly N optimal control decision problems defined by these inequalities, each of which depends structurally on the other decision maker’s decision laws. However, a Nash equilibrium solution cannot be unique due to informational nonuniqueness. The problems with informational nonuniqueness under the feedback information pattern and the need for more satisfactory resolution have been addressed via the requirement of a Nash equilibrium solution to have an additional property that its restriction on either the final part Œt; tf or the initial part Œt0 ; " is a Nash solution to the truncated version of either traditional games with terminal costs or the statistics-based games with initial costs herein, defined on either Œt; tf or Œt0 ; ", respectively. With such a restriction so defined, the solution is now termed as a feedback Nash equilibrium solution, which is now free of any informational nonuniqueness, and thus whose derivation allows a dynamic programming type argument. In conformity with the rigorous formulation of dynamic programming, the following development is important. Let the terminal time tf and states .Hi s .tf /; DM i s .tf /; Di s .tf // be given. Then the other end condition involved the initial time t0 and corresponding states .Hi s .t0 /; DM i s .t0 /; Di s .t0 // are specified by a target set requirement. Definition 9 (Slow Interactions—Target Sets). .t0 ; Hi s .t0 /; DM i s .t0 /; Di s .t0 // 2 O i s where the target set M O i s and i D 1; : : : ; N is a closed subset of ft0 g M .Rn0 n0 /4ki s .Rn0 /2ki s Rki s . f For the given terminal data .tf ; Hi s .tf /; DM i s .tf /; Di s .tf // wherein Hi s , Hi s .tf /, f f i s , DM i s .tf /, and D , Di s .tf /, the classes KO and DM f f f is

is

PO i s f M f f i s tf ;Hi s ;Di s ;Di s I

M i s ;Di s Ii s tf ;Hi s ;D

of admissible feedback decisions are now defined as follows.

Definition 10 (Slow Interactions—Admissible Feedback Sets). Let the compact subset Ki s Rmi n0 and P i s Rmi be the respective sets of allowable values. is For the given ki s 2 N and the sequence i s D fris 0gkrD1 with 1is > 0, i s i s let KO and PO be the classes of C.Œt0 ; tf I Rmi n0 / and f Mf f f Mf f is is tf ;Hi s ;Di s ;Di s I

tf ;Hi s ;Di s ;Di s I

C.Œt0 ; tf I Rmi / with values Ki s ./ 2 Ki s and pi s ./ 2 P i s , for which the risk-value aware performance index (23) is finite and the trajectory solutions to the dynamic O i s and i D 1; : : : ; N . equations (93)–(95) reach .t0 ; Hi s .t0 /; DM i s .t0 /; Di s .t0 // 2 M In the sequel, when decision maker i is confident that other N 1 decision makers choose their feedback Nash equilibrium strategies, that is, .K1s ; p1s /, : : : , .K.i 1/s ; p.i 1/s /, .K.i C1/s ; p.i C1/s /, : : : , .KN s ; pN s /. He/she then uses his/her feedback Nash equilibrium strategy .Kis ; pis /. Definition 11 (Slow Interactions—Feedback Nash Equilibrium). Let ui s .t/ D Kis .t/xO i s .t/ C pis .t/, or equivalently .Kis ; pis / constitute a feedback Nash equilibrium such that 0 i0s .Kis ; pis I ıi s / i s .Ki s ; pi s I ıi s /;

i D 1; : : : ; N

(97)

362

K.D. Pham and M. Pachter

for all admissible Ki s 2 KO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

and pi s 2 PO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

, upon which

the solutions to the dynamical systems (93)–(95) exist on Œt0 ; tf . Then, ..K1s ; p1s /; : : : ; .KN s ; pN s // when restricted to the interval Œt0 ; ˛ is still a feedback Nash equilibrium for the set of Nash control and decision problems with the appropriate terminal-value conditions .˛; His .˛/; DM is .˛/; Dis .˛// for all ˛ 2 Œt0 ; tf . Now, the decision optimization residing at decision maker i is to minimize the riskvalue aware performance index (96) for all admissible Ki s 2 KO i s f M f f i s and tf ;Hi s ;Di s ;Di s I

pi s 2 PO i s

f Mf f is tf ;Hi s ;D i s ;Di s I

while subject to interferences from all remaining decision

makers ıi s.

Definition 12 (Slow Interactions—Optimization of Mayer Problem). Assume that there exist ki s 2 N, i D 1; : : : ; N , and the sequence of nonnegative scalars is i s D fris 0gkrD1 with 1is > 0. Then, the decision optimization for decision maker i over Œt0 ; tf is given by min

O is K i s 2K

f f f M ;D Ii s tf ;Hi s ;D is is

;pi s 2PO i s

i0s .Ki s ; pi s I ıi s/

(98)

f f f M ;D Ii s tf ;Hi s ;D is is

subject to the dynamic equations (93)–(95), for ˛ 2 Œt0 ; tf . Notice that the optimization considered here is in Mayer form and can be solved by applying an adaptation of the Mayer form verification theorem of dynamic programming given in [5]. To embed the aforementioned optimization into a larger optimization problem, the terminal time and states .tf ; Hi s .tf /; DM i s .tf /; Di s .tf // are parameterized as ."; Yi s ; ZMi s ; Zi s / whereby Yi s , Hi s ."/, ZMi s , DM i s ."/, and Zi s , Di s ."/. Thus, the value function for this optimization problem is now depending on parameterizations of terminal-value conditions. Definition 13 (Slow Interactions—Value Function). Let ."; Yi s ; ZMi s ; Zi s / 2 Œt0 ; tf .Rn0 n0 /4ki s .Rn0 /2ki s Rki s be given. Then, the value function Vi s ."; Yi s ; ZMi s ; Zi s / associated with decision maker i and i D 1; : : : ; N is defined by Vi s ."; Yi s ; ZMi s ; Zi s / D

O is Kis 2K

inf

O is f Mf f is ;pis 2P f Mf f is tf ;His ;D tf ;His ;D is ;Dis I is ;Dis I

i0s .Ki s ; pi s I ıi s /: (99)

It is conventional to let Vi s ."; Yi s ; ZMi s ; Zi s / D C1 when either KO i s or PO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

is empty.

Unless otherwise specified, the dependence of trajectory solutions Hi s ./, DM i s ./, and Di s ./ on .Ki s ; pi s I ıi s / is now omitted for notational clarity. The results that

Modeling Interactions in Complex Systems

363

follow summarize some properties of the value function as necessary conditions for optimality whose verifications can be obtained via parallel adaptations [6] to those of excellent treatments in [5]. Theorem 8 (Slow Interactions—Necessary Conditions). The value function associated with decision maker i and i D 1; : : : ; N evaluated along any timebackward trajectory corresponding to a feedback decision feasible for its terminal states is an increasing function of time. Moreover, the value function evaluated along any optimal time-backward trajectory is constant. As far as a construction of scalar-valued functions Wi s ."; Yi s ; ZMi s ; Zi s /, which then serve as potential candidates for the value function, is concerned, these necessary conditions are also sufficient for optimality as shown in the next result. Theorem 9 (Slow Interactions—Sufficient Condition). Let Wi s ."; Yi s ; ZMi s ; Zi s / be an extended real-valued function on Œt0 ; tf .Rn0 n0 /4ki s .Rn0 /2ki s Rki s such that Wi s ."; Yi s ; ZMi s ; Zi s / i0s ."; Yi s ; ZMi s ; Zi s I ıi s / for decision maker i f f f and i D 1; : : : ; N . Further, let tf , Hi s , DM i s , and Di s be given the terminalvalue conditions. Suppose, for each trajectory .Hi s ; DM i s ; Di s / corresponding to a permissible decision strategy .Ki s ; pi s / in KO i s f M f f i s and PO i s f M f f i s , tf ;Hi s ;Di s ;Di s I tf ;Hi s ;Di s ;Di s I that Wi s ."; Yi s ; ZMi s ; Zi s / is finite and time-backward increasing on t0 ; tf . If .Kis ; pis / is a permissible strategy in KO i s f M f f i s and PO i s f M f f i s tf ;Hi s ;Di s ;Di s I .His ; DM is ; Dis /,

tf ;Hi s ;Di s ;Di s I

such that for the corresponding trajectory Wi s ."; Yi s ; ZMi s ; Zi s / is constant then .Ki s ; pi s / is a feedback Nash strategy. Therefore, Wi s ."; Yi s ; ZMi s ; Zi s / Vi s ."; Yi s ; ZMi s ; Zi s /. Proof. Given the space limitation, the detailed analysis and development are now referred to the work by the first author [6]. Definition 14 (Slow Interactions—Reachable Sets). Let reachable set fQO i s gN i D1 for decision maker i be defined as follows n QO i s , ."; Yi s ; ZMi s ; Zi s / 2 Œt0 ; tf .Rn0 n0 /4ki s .Rn0 /2ki s Rki s o such that KO i s f M f f i s ¤ ; and PO i s f M f f i s ¤ ; : tf ;Hi s ;Di s ;Di s I

tf ;Hi s ;Di s ;Di s I

Moreover, it can be shown that the value function associated with decision maker i is satisfying a partial differential equation at each interior point of QO i s at which it is differentiable. Theorem 10 (Slow Interactions—Hamilton–Jacobi–Bellman (HJB) Equation). Let ."; Yi s ; ZMi s ; Zi s / be any interior point of the reachable set QO i s , at which the value function Vi s ."; Yi s ; ZMi s ; Zi s / is differentiable. If there exists a feedback Nash equilibrium .Kis ; pis / 2 KO i s f M f f i s PO i s f M f f i s , then the differential equation

tf ;Hi s ;Di s ;Di s I

tf ;Hi s ;Di s ;Di s I

364

K.D. Pham and M. Pachter

( 0D

min

.Ki s ;pi s /2Kif P i s

C C

@ Vi s ."; Yi s ; ZMi s ; Zi s / @"

@ Vi s ."; Yi s ; ZMi s ; Zi s /vec.Fi s ."; Yi s ; Ki s // @ vec.Yi s / @ @ vec.ZMi s /

Vi s ."; Yi s ; ZMi s ; Zi s /vec.GMi s ."; Yi s ; ZMi s ; Ki s ; pi s //

@ C Vi s ."; Yi s ; ZMi s ; Zi s /vec.Gi s ."; Yi s ; ZMi s ; pi s // @ vec.Zi s /

) (100)

is satisfied where the boundary condition Vi s ."; Yi s ; ZMi s ; Zi s / D i0s ."; Yi s ; ZMi s ; Zi s /. Proof. By what have been shown in the recent results by the first author [6], the detailed development for the result herein can be easily proven. Finally, the following result gives the sufficient condition used to verify a feedback Nash strategy for decision maker i and i D 1; : : : ; N . Theorem 11 (Slow Interactions—Verification Theorem). Let Wi s ."; Yi s ; ZMi s ; Zi s / and i D 1; : : : ; N be continuously differentiable solution of the HJB equation (100) which satisfies the boundary condition Wi s ."; Yi s ; ZMi s ; Zi s / D i0s ."; Yi s ; ZMi s ; Zi s / : f f f Let .tf ; Hi s ; DM i s ; Di s / 2 QO i s ; .Kis ; pis / 2 KO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

(101)

PO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

;

and the corresponding solutions .Hi s ; DM i s ; Di s / of the dynamical equations (93)–(95). Then, Wi s ."; Yi s ; ZMi s ; Zi s / is time-backward increasing function of ˛. If .K ; p / is in KO i s f f f PO i s f f f defined on Œt0 ; tf with the is

is

M i s ;Di s Ii s M i s ;Di s Ii s tf ;Hi s ;D tf ;Hi s ;D M solutions .Hi s ; Di s ; Di s / of the dynamical

corresponding that, for ˛ 2 Œt0 ; tf 0D

equations (93)–(95) such

@ Wi s .˛; His .˛/; DM is .˛/; Dis .˛// @" @ Wi s .˛; His .˛/; DM is .˛/; Dis .˛//vec.Fi s .˛; His .˛/; Kis .˛/// C @ vec.Yi s / C

@ @ vec.ZMi s /

Wi s .˛; His .˛/; DM is .˛/; Dis .˛//vec.GMi s .˛; His .˛/; DM is ;

Kis .˛/; pis .˛/// C

@ Wi s .˛; His .˛/; DM is .˛/; Dis .˛//vec.Gi s .˛; His .˛/; @ vec.Zi s / DM is .˛/; pis .˛///

(102)

Modeling Interactions in Complex Systems

365

then, .Kis ; pis / is a feedback Nash strategy in KO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

PO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

Wi s ."; Yi s ; ZMi s ; Zi s / D Vi s ."; Yi s ; ZMi s ; Zi s /

,

(103)

where Vi s ."; Yi s ; ZMi s ; Zi s / is the value function associated with decision maker i . Proof. With the aid of the recent development [6], the proof then follows for the verification theorem herein. Regarding the Mayer-type optimization problem herein, it can be solved by applying an adaptation of the Mayer form verification theorem of dynamic programming as f f in (102). Therefore, the terminal time and states ."; Hi s ; DM i s ; Di s / of the dynamics (93)–(95) are now parameterized as ."; Yi s ; ZMi s ; Zi s / for a broader family of optimization problems. To apply properly the dynamic programming approach based on the HJB mechanism, together with the verification result, the solution procedure should be formulated as follows. For any given interior point ."; Yi s ; ZMi s ; Zi s / of the reachable set QO i s and i D 1; : : : ; N , at which the following real-valued function is considered as a candidate solution Wi s ."; Yi s ; ZMi s ; Zi s / to the HJB equation (100). Because the initial state x00 , which is arbitrarily fixed represents both quadratic and linear contributions to the performance index (96) of Mayer type, it hence leads to suspect that the value function is linear and quadratic in x00 . Thus, a candidate function Wi s 2 C 1 .t0 ; tf I R/ for the value function is expected to have the form T Wi s ."; Yi s ; ZMi s ; Zi s / D x00

ki s X

ris .Yi11s;r C Eirs ."//x00

rD1 T C2x00

ki s X rD1

ris .ZMi11s;r C TMi rs ."// C

ki s X

ris .Zi s;r C Ti rs ."//

rD1

(104) where the parametric functions of time Eirs 2 C 1 .t0 ; tf I Rn0 n0 /, TMi rs 2 C 1 .t0 ; tf I Rn0 /, and Ti rs 2 C 1 .t0 ; tf I R/ are yet to be determined. Moreover, it can be shown that the derivative of W."; Yi s ; ZMi s ; Zi s / with respect to time " is kis X d d r T 11 12 21 W ."; Yi s ; ZMi s ; Zi s / D x00 ris Fi11 E ."/ x00 s;r ."; Yi s ; Yi s ; Yi s ; Ki s / C d" d" i s rD1 T C2x00

C

kis X

d ris GMi11s;r ."; Yi11s ; ZMi11s ; Ki s ; pi s C TMirs ."/ d" rD1

kis X

d ris Gi s;r ."; Yi11s ; Yi12s ; Yi21s ; Yi22s ; ZMi11s ; pi s / C Ti rs ."/ : d" rD1 (105)

366

K.D. Pham and M. Pachter

The substitution of this candidate (104) for the value function into the HJB equation (100) and making use of (105) yield ( 0D

min

.Ki s ;pi s /2Ki s P i s T C2x00

C

ki s X rD1

T x00

ki s X

d r 11 12 21 ris Fi11 E ."/ x00 s;r ."; Yi s ; Yi s ; Yi s ; Ki s / C d" i s rD1

ki s X

d ris GMi11s;r ."; Yi11s ; ZMi11s ; Ki s ; pi s C TMi rs ."/ d" rD1

ris

) d Gi s;r ."; Yi11s ; Yi12s ; Yi21s ; Yi22s ; ZMi11s ; pi s / C Ti rs ."/ : d"

(106)

Taking the gradient with respect to Ki s and pi s of the expression within the bracket of (106) yield the necessary conditions for an extremum of risk-value performance index (96) on the time interval Œt0 ; " " Ki s D

Ri1 s

BiTs

ki s X

O ris Yi11s;r

rD1 T pi s D Ri1 s Bi s

ki s X

1 C 1 Qi s ."/ i s

O ris ZMi11s;r :

# (107)

(108)

rD1 r

where the normalized weights O ris , i1s . is Given that the feedback Nash strategy (107) and (108) is applied to the expression (106), the minimum of (106) for any " 2 Œt0 ; tf and when Yi s , ZMi s , and Zi s evaluated along the solutions to the dynamical equations (93)–(95) must be is sought in the next step. As it turns out, the time-dependent functions fEirs ./gkrD1 , k k r i s r i s fTMi s ./grD1, and fTi s ./grD1, which will render the left-hand side of (106) equal to zero, must satisfy the time-backward differential equations, for 1 r ki s d r d d Mr d d r d E ."/ D Hi11s;r ."/I T ."/ D Di s;r ."/ T ."/ D DM i11s;r ."/I d" i s d" d" i s d" d" i s d" (109) whereby the respective Hi11s;r ./, DM i11s;r ./, and Di s;1 ./ are the solutions to: the backward-in-time matrix-valued differential equations d 11 H ."/ D .A0s C Bi s Ki s ."//T Hi11s;1 ."/ Hi11s;1 ."/.A0s C Bi s Ki s ."// d" i s;1 Q0i s KiTs ."/Ri s Ki s ."/ 2Qi s Ki s ."/

(110)

Modeling Interactions in Complex Systems

367

when 2 r ki s d 11 H ."/ D .A0s C Bi s Ki s ."//T Hi11s;r ."/ Hi11s;r ."/.A0s C Bi s Ki s ."// d" i s;r

r1 X vD1

r1 X vD1

11 2rŠ s s Hi s;v ."/˘11 ."/ C Hi12s;v ."/˘21 ."/ Hi11s;rv ."/ vŠ.r v/Š 11 2rŠ s s Hi s;v ."/˘12 ."/ C Hi12s;v ."/˘22 ."/ Hi21s;rv ."/ vŠ.r v/Š (111)

d 12 H ."/ D .A0s C Bi s Ki s ."//T Hi12s;1 ."/ Hi11s;1 ."/.Li s ."/Ci s / d" i s;1 Hi12s;1 ."/.A0s Li s ."/Ci s C Li s ."/Ci s / Q0i s

(112)

when 2 r ki s d 12 H ."/ D .A0s C Bi s Ki s ."//T Hi12s;r ."/ d" i s;r Hi12s;r ."/.A0s Li s ."/Ci s C Li s ."/Ci s / Hi11s;r ."/.Li s ."/Ci s /

r1 X vD1

r1 X vD1

11 2rŠ s s Hi s;v ."/˘11 ."/ C Hi12s;v ."/˘21 ."/ Hi12s;rv ."/ vŠ.r v/Š 11 2rŠ s s ."/ C Hi12s;v ."/˘22 ."/ Hi22s;rv ."/ Hi s;v ."/˘12 vŠ.r v/Š

(113)

d 21 H ."/ D .A0s Li s ."/Ci s C Li s ."/Ci s /T Hi21s;1 ."/ d" i s;1 Hi21s;1 ."/.A0s C Bi s Ki s ."// Q0i s 2Qi s Ki s ."/ .Li s ."/Ci s /T Hi11s;1 ."/

(114)

when 2 r ki s d 21 H ."/ D Hi21s;r ."/.A0s C Bi s Ki s ."// .A0s Li s ."/Ci s d" i s;r CLi s ."/Ci s /T Hi21s;r ."/ .Li s ."/Ci s /T Hi11s;r ."/

r1 X vD1

21 2rŠ s s ."/ C Hi22s;v ."/˘21 ."/ Hi11s;rv ."/ Hi s;v ."/˘11 vŠ.r v/Š

368

K.D. Pham and M. Pachter

r1 X vD1

21 2rŠ s s Hi s;v ."/˘12 ."/ C Hi22s;v ."/˘22 ."/ Hi21s;rv ."/ vŠ.r v/Š (115)

d 22 H ."/ D .Li s ."/Ci s /T Hi12s;1 ."/ .A0s Li s ."/Ci s d" i s;1 CLi s ."/Ci s /T Hi22s;1 ."/ Hi22s;1 ."/.A0s Li s ."/Ci s CLi s ."/Ci s / Hi21s;1 ."/.Li s ."/Ci s / Q0i s

(116)

when 2 r ki s d 22 H ."/ D .Li s ."/Ci s /T Hi12s;r ."/ .A0s Li s ."/Ci s C Li s ."/Ci s /T Hi22s;r ."/ d" i s;r Hi22s;r ."/.A0s Li s ."/Ci s C Li s ."/Ci s / Hi21s;r ."/.Li s ."/Ci s /

r1 X vD1

r1 X vD1

21 2rŠ s s Hi s;v ."/˘11 ."/ C Hi22s;v ."/˘21 ."/ Hi12s;rv ."/ vŠ.r v/Š 21 2rŠ s s Hi s;v ."/˘12 ."/ C Hi22s;v ."/˘22 ."/ Hi22s;rv ."/ vŠ.r v/Š (117)

the backward-in-time vector-valued differential equations d M 11 D ."/ D .A0s C Bi s Ki s ."//T DM i11s;1 ."/ d" i s;1 Hi11s;1 ."/Bi s pi s ."/ KiTs ."/Ri s pi s ."/ Qi s pi s ."/

(118)

when 2 r ki s d M 11 D ."/ D .A0s C Bi s Ki s ."//T DM i11s;r ."/ Hi11s;r ."/Bi s pi s ."/ d" i s;r

(119)

d M 21 D ."/ D .A0s Li s ."/Ci s C Li s ."/Ci s /T DM i21s;1 ."/ .Li s ."/Ci s /T DM i11s;1 ."/ d" i s;1 Hi21s;1 ."/Bi s pi s ."/ Qi s pi s ."/

(120)

when 2 r ki s d M 21 D ."/ D .A0s Li s ."/Ci s C Li s ."/Ci s /T DM i21s;r ."/ .Li s ."/Ci s /T DM i11s;r ."/ d" i s;r Hi21s;r ."/Bi s pi s ."/

(121)

Modeling Interactions in Complex Systems

369

and the backward-in-time scalar-valued differential equations ˚ ˚ 12 d s s Di s;1 ."/ D 2.DM i11s;1 ."//T Bi s pi s ."/ Tr H11 i s;1 ."/˘11 ."/ C Tr Hi s;1 ."/˘21 ."/ d" ˚ ˚ 22 s s T Tr H21 i s;1 ."/˘12 ."/ C Tr Hi s;1 ."/˘22 ."/ pi s ."/Ri s pi s ."/ (122)

when 2 r ki s ˚ ˚ 12 d s s Di s;r ."/ D 2.DM i11s;r ."//T Bi s pi s ."/ Tr H11 i s;r ."/˘11 ."/ C Tr Hi s;r ."/˘21 ."/ d" ˚ ˚ 22 s s Tr H21 (123) i s;r ."/˘12 ."/ C Tr Hi s;r ."/˘22 ."/ :

For the remainder of the development, the requirement for boundary condition (101) yields Eirs .t0 / D 0, TMi rs .t0 / D 0, and Ti rs .t0 / D 0. Finally, the sufficient condition (100) of the verification theorem is hence satisfied so the extremizing feedback Nash strategy (107) and (108) is optimal ki s h i X 1 T Kis ."/ D Ri1 O ris Hi11 s Bi s s;r ."/ C 1 Qi s ."/ i s rD1 T pis ."/ D Ri1 s Bi s

ki s X

O ris DM i11 s;r ."/ :

(124)

(125)

rD1

Therefore, the subsequent result for risk-bearing decisions in slow interactions is summarized for each decision maker, who strategically selects: (a) the worst-case estimation gain Li s in presence of the group interference gain Li s and (b) the feedback Nash decision parameters Kis and pis . Theorem 12 (Slow Interactions—Slow-Timescale Risk-Averse Decisions). Consider slow interactions with the optimization problem governed by the risk-value aware performance index (96) and subject to the dynamical equations (93)–(95). Fix ki s 2 N for i D 1; : : : ; N , and the sequence of nonnegative coefficients is i s D fris 0gkrD1 with 1is > 0. Then, a linear feedback Nash equilibrium for slow interactions minimizing (96) is given by ui s .t/ D Kis .t/xO is .t/ C pis .t/; t , t0 C tf ˛; ˛ 2 Œt0 ; tf # " ki s X 1 r 1 T r 11 Ki s .˛/ D Ri s Bi s O i s Hi s;r .˛/ C 1 Qi s .˛/ ; O ris , i1s i s i s rD1 T pis .˛/ D Ri1 s Bi s

ki s X

O ris DM i11 s;r .˛/;

i D 1; : : : ; N

(126)

(127)

rD1

where all the parametric design freedom through O ris represent the preferences toward specific summary statistical measures; for example, mean variance,

370

K.D. Pham and M. Pachter

skewness, etc. chosen by decision makers for their performance reliability, while M 11 xO is ./, Hi11 s;r ./ and Di s;r ./ are the optimal solutions of the dynamical systems (47) and (110)–(119) when the decision policy ui s and linear feedback Nash equilibrium .Kis ; pis / are applied. Remark 5. It is observed that to have a linear feedback Nash equilibrium Kis ; pis , and i D 1; : : : ; N be defined and continuous for all ˛ 2 Œt0 ; tf , the solutions Hi s .˛/, DM i s .˛/, and Di s .˛/ to the (93)–(95) when evaluated at ˛ D t0 must also exist. Therefore, it is necessary that Hi s .˛/, DM i s .˛/, and Di s .˛/ are finite for all ˛ 2 Œt0 ; tf /. Moreover, the solutions of (93)–(95) exist and are continuously differentiable in a neighborhood of tf . In fact, these solutions can further be extended to the left of tf as long as Hi s .˛/, DM i s .˛/, and Di s .˛/ remain finite. Hence, the existences of unique and continuously differentiable solutions to the (93)–(95) are certain if Hi s .˛/, DM i s .˛/, and Di s .˛/ are bounded for all ˛ 2 Œt0 ; tf /. As the result, the candidate value functions Wi s .˛; Hi s .˛/; DM i s .˛/; Di s .˛// for i D 1; : : : ; N are continuously differentiable as well.

6 Conclusions A complex system is more than the sum of its parts, and the individual decision makers that function as complex dynamical systems can be understood only by analyzing their collective behavior. This research article shows recent advances on distributed information and decision frameworks, including singular perturbation methods for weak and strong coupling approximations in large-scale systems, optimal statistical control decision algorithms for performance reliability, mutual modeling, and minimax estimation for self-coordination, and Nash game-theoretic design protocols for global mission management enabled by local and autonomous decision makers, can be brought to bear on central problems of making assumptions about how to link different levels of dynamical complexity analysis related to the emergence, risk-bearing decisions, and dissolution of hierarchical macrostructures. The emphasis is on the application of a new generation of summary statistical measures associated with the linear-quadratic class of multiperson decision making and control problems in addition of values and risks-based performance indices that can provide a new paradigm for understanding and building distributed systems, where it is assumed that the individual decision makers are autonomous: able to control their own risk-bearing behavior in the furtherance of their own goals.

Appendix: Fast Interactions In Theorem 1, the lack of analysis of performance uncertainty and information around a class of stochastic quadratic decision problems was addressed. The central concern was to examine what means for performance riskiness from the standpoint

Modeling Interactions in Complex Systems

371

of higher-order characteristics pertaining to performance sampling distributions. An effective and accurate capability for forecasting all the higher-order characteristics associated with a finite horizon integral-quadratic performance-measure has been obtained in Theorem 1. For notational simplicity, the right members of the mathematical statistics, which are now considered as the dynamical equations (16)–(20) for the optimal statistical control problem herein, were denoted by the convenient mappings with the actions: 11 Fif;1 .˛; Hif11 .˛/; Hif12 .˛/; Hif21 .˛/; Kif .˛// , .Ai i C Bi i Kif .˛//T Hif11 .˛; 1/

Hif11 .˛; 1/.Ai i C Bi i Kif .˛// Qif KifT .˛/Rif Kif .˛/

(128)

and, for 2 r kif 11 Fif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif21 .˛/; Kif .˛//

, .Ai i C Bi i Kif .˛//T Hif11 .˛; r/ Hif11 .˛; r/.Ai i C Bi i Kif .˛//

r1 X vD1

r1 X vD1

h i 2rŠ f f Hif11 .˛; v/˘11 .˛/ C Hif12 .˛; v/˘21 .˛/ Hif11 .˛; r v/ vŠ.r v/Š h i 2rŠ f f Hif11 .˛; v/˘12 .˛/ C Hif12 .˛; v/˘22 .˛/ Hif21 .˛; r v/ vŠ.r v/Š (129)

12 .˛; Hif11 .˛/; Hif12 .˛/; Hif22 .˛/; Kif .˛// , .Ai i C Bi i Kif .˛//T Hif12 .˛; 1/ Fif;1

Hif11 .˛; 1/.Lif .˛/Ci i / Hif12 .˛; 1/.Ai i Lif .˛/Ci i / Qif

(130)

and, for 2 r kif 12 Fif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif22 .˛/; Kif .˛// , .Ai i C Bi i Kif .˛//T Hif12 .˛; r/

Hif11 .˛; r/.Lif .˛/Ci i / Hif12 .˛; r/.Ai i Lif .˛/Ci i /

r1 X vD1

r1 X vD1

h i 2rŠ f f Hif11 .˛; v/˘11 .˛/ C Hif12 .˛; v/˘21 .˛/ Hif12 .˛; r v/ vŠ.r v/Š h i 2rŠ f f Hif11 .˛; v/˘12 .˛/ C Hif12 .˛; v/˘22 .˛/ Hif22 .˛; r v/ (131) vŠ.r v/Š

21 Fif;1 .˛; Hif11 .˛/; Hif12 .˛/; Hif22 .˛/; Kif .˛// , .Ai i Lif .˛/Ci i /T Hif21 .˛; 1/

372

K.D. Pham and M. Pachter

Hif21 .˛; 1/.Ai i C Bi i Kif .˛// .Lif .˛/Ci i /T Hif11 .˛; 1/ Qif

(132)

and, for 2 r kif 21 Fif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif22 .˛/; Kif .˛// , .Ai i Lif .˛/Ci i /T Hif21 .˛; r/

Hif21 .˛; r/.Ai i C Bi i Kif .˛// .Lif .˛/Ci i /T Hif11 .˛; r/

r1 X vD1

r1 X vD1

h i 2rŠ f f Hif21 .˛; v/˘11 .˛/ C Hif22 .˛; v/˘21 .˛/ Hif11 .˛; r v/ vŠ.r v/Š h i 2rŠ f f Hif21 .˛; v/˘12 .˛/ C Hif22 .˛; v/˘22 .˛/ Hif21 .˛; r v/ (133) vŠ.r v/Š

22 Fif;1 .˛; Hif12 .˛/; Hif21 .˛/; Hif22 .˛// , .Ai i Lif .˛/Ci i /T Hif22 .˛; 1/ Qif

Hif22 .˛; 1/.Ai i Lif .˛/Ci i / .Lif .˛/Ci i /T Hif12 .˛; 1/ Hif21 .˛; 1/.Lif .˛/Ci i / (134) and, for 2 r kif 22 Fif;r .˛; Hif12 .˛/; Hif21 .˛/; Hif22 .˛// , .Ai i Lif .˛/Ci i /T Hif22 .˛; r/

Hif22 .˛; r/.Ai i Lif .˛/Ci i / .Lif .˛/Ci i /T Hif12 .˛; r/ Hif21 .˛; r/.Lif .˛/Ci i /

r1 X vD1

r1 X vD1

h i 2rŠ f f Hif21 .˛; v/˘11 .˛/ C Hif22 .˛; v/˘21 .˛/ Hif12 .˛; r v/ vŠ.r v/Š h i 2rŠ f f Hif21 .˛; v/˘12 .˛/ C Hif22 .˛; v/˘22 .˛/ Hif22 .˛; r v/ vŠ.r v/Š

(135)

n o f Gif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif12 .˛/; Hif22 .˛// , Tr Hif11 .˛; r/˘11 .˛/ o n o n o n f f f Tr Hif12 .˛; r/˘21 .˛/ Tr Hif21 .˛; r/˘12 .˛/ Tr Hif22 .˛; r/˘22 .˛/ ; (136) f

where the Kalman filter gain Lif D Pif CiTi Vi1 i and the shorthand notations ˘11 D f f f f T Lif Vi i Lif , ˘12 D ˘21 D ˘11 , and ˘22 D Gi W GiT C Lif Vi i LTif .

Modeling Interactions in Complex Systems

373

References 1. Saksena, V.R., Cruz, J.B. Jr.: A multimodel approach to stochastic Nash games. Automatica 18(3), 295–305 (1982) 2. Haddad, A.: Linear filtering of singularly perturbed systems. IEEE Trans. Automat. Contr. 21, 515–519 (1976) 3. Khalih, H., Haddad, A., Blankenship, G.: Parameter scaling and well-posedness of stochastic singularly perturbed control systems. Proceedings of Twelfth Asilomar Conference, Pacific Grove, CA (1978) 4. Pham, K.D.: New risk-averse control paradigm for stochastic two-time-scale systems and performance robustness. J. Optim. Theory. Appl. 146(2), 511–537 (2010) 5. Fleming, W.H., Rishel, R.W.: Deterministic and Stochastic Optimal Control. Springer, New York (1975) 6. Pham, K.D.: Performance-reliability-aided decision-making in multiperson quadratic decision games against jamming and estimation confrontations. J. Optim. Theory Appl. 149(1), 599–629 (2011) 7. Yaesh, I., Shaked, U.: Game theory approach to optimal linear state estimation and its relation to the minimum H1 norm estimation. IEEE Trans. Automat. Contr. 37, 828–831 (1992) 8. Jacobson, D.H.: Optimal stochastic linear systems with exponential performance criteria and their relation to deterministic games. IEEE Trans. Automat. Contr. 18, 124–131 (1973) 9. Whittle, P.: Risk Sensitive Optimal Control. Wiley, New York (1990)

For further volumes: http://www.springer.com/series/10533

Springer Proceedings in Mathematics & Statistics

This book series will feature volumes of selected contributions from workshops and conferences in all areas of current research activity in mathematics and statistics, operations research and optimization. In addition to an overall evaluation of the interest, scientific quality, and timeliness of each proposal at the hands of the publisher, every individual contribution is refereed to standards comparable to those of leading journals in the field. This expanded series thus proposes to the research community well-edited and authoritative reports on newest developments in the most interesting and promising areas of mathematical and statistical research today.

Alexey Sorokin • Robert Murphey • My T. Thai Panos M. Pardalos Editors

Dynamics of Information Systems: Mathematical Foundations

123

Editors Alexey Sorokin Industrial and Systems Engineering University of Florida Gainesville, FL USA

Robert Murphey Air Force Research Lab Munitions Directorate Eglin Air Force Base, FL USA

My T. Thai Department of Computer and Information Science and Engineering University of Florida Gainesville, FL USA

Panos M. Pardalos Center for Applied Optimization Industrial and Systems Engineering University of Florida Gainesville, FL USA Laboratory of Algorithms and Technologies for Networks Analysis (LATNA) National Research University Higher School of Economics Moscow, Russia

ISBN 978-1-4614-3905-9 ISBN 978-1-4614-3906-6 (eBook) DOI 10.1007/978-1-4614-3906-6 Springer New York Heidelberg Dordrecht London Library of Congress Control Number: 2012939429 © Springer Science+Business Media New York 2012 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface

Information systems have become an inevitable part of contemporary society and affect our lives every day. With rapid development of the technology, it is crucial to understand how information, usually in the form of sensing and control, influences the evolution of a distributed or networked system, such as social, biological, genetic, and military systems. The dynamic aspect of information fundamentally describes the potential influence of information on the system and how that information flows through the system and is modified in time and space. Understanding this dynamics will help to design a high-performance distributed system for real-world applications. One notable example is the integration of sensor networks and transportation where the traffic and vehicles are continuously moving in time and space. Another example would be applications in the cooperative control systems, which have a high impact on our society, including robots operating within a manufacturing cell, unmanned aircraft in search and rescue operations or military surveillance and attack missions, arrays of microsatellites that form distributed large aperture radar, or employees operating within an organization. Therefore, concepts that increase our knowledge of the relational aspects of information as opposed to the entropic content of information will be the focus of the study of information systems dynamics in the future. This book presents the state of the art relevant to the theory and practice of the dynamics of information systems and thus lays a mathematical foundation in the field. The first part of the book provides a discussion about evolution of information in time, adaptation in a Hamming space, and its representation. This part also presents an important problem of optimization of information workflow with algorithmic approach, as well as integration principle as the master equation of the dynamics of information systems. A new approach for assigning task difficulty for operators during multitasking is also presented in this part. Second part of the book analyzes critical problems of information in distributed and networked systems. Among the problems discussed in this part are sensor scheduling for space object tracking, randomized multidimensional assignment, as well as various network problems and solution approaches. The dynamics of climate networks and complex network models are also discussed in this part. The third part of the book v

vi

Preface

provides game-theoretical foundations for dynamics of information systems and considers the role of information in differential games, cooperative control, protocol design, and leader with multiple followers games. We gratefully acknowledge the financial support of the Air Force Research Laboratory and the Center for Applied Optimization at the University of Florida. We thank all the contributing authors and the anonymous referees for their valuable and constructive comments that helped to improve the quality of this book. Furthermore, we thank Springer Publisher for making the publication of this book possible. Gainesville, FL, USA

Alexey Sorokin Robert Murphey My T. Thai Panos M. Pardalos

Contents

Part I

Evolution and Dynamics of Information Systems

Dynamics of Information and Optimal Control of Mutation in Evolutionary Systems .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . Roman V. Belavkin

3

Integration Principle as the Master Equation of the Dynamics of an Information System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . Victor Korotkikh and Galina Korotkikh

23

On the Optimization of Information Workflow . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . Michael J. Hirsch, H´ector Ortiz-Pe˜na, Rakesh Nagi, Moises Sudit, and Adam Stotz Characterization of the Operator Cognitive State Using Response Times During Semiautonomous Weapon Task Assignment . . . . . Pia Berg-Yuen, Pavlo Krokhmal, Robert Murphey, and Alla Kammerdiner Correntropy in Data Classification.. . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . Mujahid N. Syed, Jose C. Principe, and Panos M. Pardalos Part II

43

67

81

Dynamics of Information in Distributed and Networked Systems

Algorithms for Finding Diameter-constrained Graphs with Maximum Algebraic Connectivity . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 121 Harsha Nagarajan, Sivakumar Rathinam, Swaroop Darbha, and Kumbakonam Rajagopal Robustness and Strong Attack Tolerance of Low-Diameter Networks . . . . 137 Alexander Veremyev and Vladimir Boginski

vii

viii

Contents

Dynamics of Climate Networks .. . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 157 Laura C. Carpi, Patricia M. Saco, Osvaldo A. Rosso, and Mart´ın G´omez Ravetti Sensor Scheduling for Space Object Tracking and Collision Alert .. . . . . . . . 175 Huimin Chen, Dan Shen, Genshe Chen, and Khanh Pham Throughput Maximization in CSMA Networks with Collisions and Hidden Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 195 Sankrith Subramanian, Eduardo L. Pasiliao, John M. Shea, Jess W. Curtis, and Warren E. Dixon Optimal Formation Switching with Collision Avoidance and Allowing Variable Agent Velocities . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 207 Dalila B.M.M. Fontes, Fernando A.C.C. Fontes, and Am´elia C.D. Caldeira Computational Studies of Randomized Multidimensional Assignment Problems .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 225 Mohammad Mirghorbani, Pavlo Krokhmal, and Eduardo L. Pasiliao On Some Special Network Flow Problems: The Shortest Path Tour Problems .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 245 Paola Festa Part III

Game Theory and Cooperative Control Foundations for Dynamics of Information Systems

A Hierarchical MultiModal Hybrid Stackelberg–Nash GA for a Leader with Multiple Followers Game . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 267 Egidio D’Amato, Elia Daniele, Lina Mallozzi, Giovanni Petrone, and Simone Tancredi The Role of Information in Nonzero-Sum Differential Games.. . . . . . . . . . . . . 281 Meir Pachter and Khanh Pham Information Considerations in Multi-Person Cooperative Control/Decision Problems: Information Sets, Sufficient Information Flows, and Risk-Averse Decision Rules for Performance Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 305 Khanh D. Pham and Meir Pachter Modeling Interactions in Complex Systems: Self-Coordination, Game-Theoretic Design Protocols, and Performance Reliability-Aided Decision Making. . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 329 Khanh D. Pham and Meir Pachter

Contributors

Roman V. Belavkin Middlesex University, London, UK Pia Berg-Yuen Air Force Research Lab, Munitions Directorate, Eglin AFB, FL, USA Vladimir Boginski Department of Industrial and Systems Engineering, University of Florida, Shalimar, FL, USA Am´elia C.D. Caldeira Departamento de Matem´atica, Instituto Superior de Engenharia do Porto, Porto, Portugal Laura C. Carpi Civil, Surveying and Environmental Engineering, The University of Newcastle, New South Wales, Australia, Departamento de F´ısica, Universidade Federal de Minas Gerais, Belo Horizonte, Brazil Genshe Chen I-Fusion Technology, Inc., Germantown, MD, USA Huimin Chen University of New Orleans, Department of Electrical Engineering, New Orleans, LA, USA Jess W. Curtis Munitions Directorate, Air Force Research Laboratory, Eglin AFB, FL, USA Egidio D’Amato Dipartimento di Scienze Applicate, Universit`a degli Studi di Napoli “Parthenope”, Centro Direzionale di Napoli, Napoli, Italy Elia Daniele Dipartimento di Ingegneria Aerospaziale, Universit`a degli Studi di Napoli “Federico II”, Napoli, Italy Swaroop Darbha Department of Mechanical Engineering, Texas A&M University, College Station, TX, USA Warren E. Dixon Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA Paola Festa Department of Mathematics and Applications, University of Napoli FEDERICO II, Compl. MSA, Napoli, Italy ix

x

Contributors

Dalila B.M.M. Fontes LIAAD - INESC Porto L.A. and Faculdade de Economia, Universidade do Porto, Porto, Portugal Fernando A.C.C. Fontes ISR Porto and Faculdade de Engenharia, Universidade do Porto, Porto, Portugal Michael J. Hirsch Raytheon Company, Intelligence and Information Systems, Annapolis Junction, MD, USA Alla Kammerdiner New Mexico State University, Las Cruces, NM, USA Galina Korotkikh School of Information and Communication Technology, CQUniversity, Mackay, Queensland, Australia Victor Korotkikh School of Information and Communication Technology, CQUniversity, Mackay, Queensland, Australia Pavlo Krokhmal Department of Mechanical and Industrial Engineering, University of Iowa, Iowa City, IA, USA Lina Mallozzi Dipartimento di Matematica e Applicazioni, Universit`a degli Studi di Napoli “Federico II”, Napoli, Italy Mohammad Mirghorbani Department of Mechanical and Industrial Engineering, University of Iowa, Iowa City, IA, USA Robert Murphey Air Force Research Lab, Munitions Directorate, Eglin AFB, FL, USA Harsha Nagarajan Department of Mechanical Engineering, Texas A&M University, College Station, TX, USA Rakesh Nagi University at Buffalo, Department of Industrial and Systems Engineering, Buffalo, NY, USA ˜ CUBRC, Buffalo, NY, USA H´ector Ortiz-Pena Meir Pachter Air Force Institute of Technology, AFIT, Wright Patterson AFB, OH, USA Panos M. Pardalos Department of Industrial and Systems Engineering, University of Florida, Gainesville, FL, USA Eduardo L. Pasiliao Munitions Directorate, Air Force Research Laboratory, Eglin AFB, FL, USA Giovanni Petrone Dipartimento di Ingegneria Aerospaziale, Universit`a degli Studi di Napoli “Federico II”, Napoli, Italy Khanh Pham Air Force Research Laboratory, Space Vehicles Directorate, Kirtland Air Force Base, NM, USA Jose C. Principe Computational NeuroEngineering Laboratory, University of Florida, Gainesville, FL, USA

Contributors

xi

Kumbakonam Rajagopal Department of Mechanical Engineering, Texas A&M University, College Station, TX, USA Sivakumar Rathinam Department of Mechanical Engineering, Texas A&M University, College Station, TX, USA Mart´ın G´omez Ravetti Departamento de Engenharia de Produc¸a˜ o, Universidade Federal de Minas Gerais, Belo Horizonte, Brazil Osvaldo A. Rosso Chaos & Biology Group, Instituto de C´alculo, Universidad de Buenos Aires, Argentina, Departamento de F´ısica, Universidade Federal de Minas Gerais, Universidade Federal de Minas Gerais, Belo Horizonte, Brazil Patricia M. Saco Civil, Surveying and Environmental Engineering, The University of Newcastle, New South Wales, Australia John M. Shea Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA Dan Shen I-Fusion Technology, Inc., Germantown, MD, USA Adam Stotz CUBRC, Buffalo, NY, USA Sankrith Subramanian Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA Moises Sudit CUBRC, Buffalo, NY, USA Mujahid N. Syed Department of Industrial and Systems Engineering, University of Florida, Gainesville, FL, USA Simone Tancredi Dipartimento di Ingegneria Aerospaziale, Universit`a degli Studi di Napoli “Federico II”, Napoli, Italy Alexander Veremyev Department of Industrial and Systems Engineering, University of Florida, Gainesville, FL, USA

Part I

Evolution and Dynamics of Information Systems

Dynamics of Information and Optimal Control of Mutation in Evolutionary Systems Roman V. Belavkin

Abstract Evolutionary systems are used for search and optimization in complex problems and for modelling population dynamics in nature. Individuals in populations reproduce by simple mechanisms, such as mutation or recombination of their genetic sequences, and selection ensures they evolve in the direction of increasing fitness. Although successful in many applications, evolution towards an optimum or high fitness can be extremely slow, and the problem of controlling parameters of reproduction to speed up this process has been investigated by many researchers. Here, we approach the problem from two points of view: (1) as optimization of evolution in time; (2) as optimization of evolution in information. The former problem is often intractable, because analytical solutions are not available. The latter problem, on the other hand, can be solved using convex analysis, and the resulting control, optimal in the sense of information dynamics, can achieve good results also in the sense of time evolution. The principle is demonstrated on the problem of optimal mutation rate control in Hamming spaces of sequences. To facilitate the analysis, we introduce the notion of a relatively monotonic fitness landscape and obtain general formula for transition probability by simple mutation in a Hamming space. Several rules for optimal control of mutation are presented, and the resulting dynamics are compared and discussed. Keywords Fitness • Information • Hamming space • Mutation rate • Optimal evolution

R.V. Belavkin () Middlesex University, London NW4 4BT, UK e-mail: [email protected] A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 1, © Springer Science+Business Media New York 2012

3

4

R.V. Belavkin

1 Introduction Dynamical systems have traditionally been considered as time evolution using mathematical models based on Markov processes and corresponding differential equations. These methods achieved tremendous success in many applications, particularly in optimal estimation and control of linear and some non-linear systems [6,12,18]. Markov processes have also been applied in studies of learning [11,20,21] and evolutionary systems [2, 14, 22]. Their optimization, however, is complicated for several reasons. One of them is that the relation between available controls and values of an objective function is not well defined or uncertain. Another is an incredible complexity associated with their optimization. The first difficulty can be sometimes overcome either by defining and analysing the underlying structure of the system or by learning the relationships between the controls and objective function from data. Here, we take the former approach. We first outline some general principles by relating a topology of the system to the objective function. Then we consider probability of simple mutation of sequences in a Hamming space, and derive expressions for its relation to values of a fitness function. The resulting system, however, although completely defined, quickly becomes intractable for optimization of its evolution in time using traditional methods with the exception of a few special cases. Evolution of dynamical systems can be considered from another point of view as evolution in information. In fact, dynamic information is one of the main characteristics of learning and evolutionary systems. Information dynamics can be understood simply as changes of information distance between states, represented by probability measures on a phase space. Although optimality with respect to information has been studied in theories of information utility [19] and information geometry [1, 8], there were few attempts to integrate information dynamics in synthesis of optimal control of dynamical systems [3–5, 7]. Understanding better the relation between optimality with respect to time and information criteria has been the main motivation for this work. In the next section, we formulate and consider problems of optimization of evolution in time and in information. Then we consider evolution of a discrete system of sequences and derive relevant expressions for optimization of their position in a Hamming space. Special cases will be considered in Sect. 4 to derive several control functions for mutation rate and evaluate their performance. Then we shall summarize and discuss the results.

2 Evolution in Time and Information Let ˝ be the set of elementary events and f W ˝ ! R be an objective function. An evolution of a system is represented by a sequence !0 ; !1 ; : : : ; !t ; : : : of events, indexed by time, and we shall consider a control problem optimizing the evolution

Dynamics of Information and Optimal Control of Mutation

5

with respect to the objective function. For simplicity, we shall assume that ˝ is countable or even a finite set, so that there is at most a countable or finite number of values x D f .!/. This is because we focus in this paper on applications of such problems to biological or evolutionary systems. In this context, ˝ represents the set of all possible individual organisms (e.g. the set of all DNA sequences), and f is called a fitness function. The sequence f!t g represents descendants of !0 in t 0 generations. Fitness function represents (or induces) a total pre-order . on ˝: a . b if and only if f .a/ f .b/. It factorizes ˝ into the equivalence classes of fitness: Œx WD f! 2 ˝ W f .!/ D xg : Thus, from the point of optimization of fitness f , sequences !0 ; : : : ; !t ; : : : corresponding to the same sequence x0 ; : : : ; xt ; : : : of fitness values are equivalent. Equivalent evolutions are represented by the real stochastic process fxt g of fitness values.

2.1 Optimization of Evolution in Time Let P .xsC1 j xs / be the conditional probability of an offspring having fitness value xsC1 D f .!sC1 / given that its parent had fitness value xs D f .!s /. This Markov probability can be represented by a left stochastic matrix T , and if transition probabilities P .xsC1 j xs / do not depend on s, then T defines a stationary (or timehomogeneous) Markov process xt . In particular, T t defines a linear transformation of distribution ps WD P .xs / of fitness values at time s into distribution psCt WD P .xsCt / of fitness values after t 0 generations: X psC1 D Tps D P .xsC1 j xs / P .xs / ; ) psCt D T t ps : xs 2f .˝/

The expected fitness of the offspring after t generations is X EfxsCt g WD xsCt P .xsCt /: xsCt 2f .˝/

We say that individuals adapt if and only if EfxsCt g Efxs g. Suppose that the transition probability P .xsC1 j xs / depends on a control parameter , so that the Markov operator T.x/ depends on the control function .x/. Then the expected fitness E.x/ fxsCt g also depends on .x/. In the context of biological or evolutionary systems, can be related to a reproduction strategy, which involves mutation and recombination of DNA sequences. The optimal control should maximize expected fitness of the offspring to achieve maximum or fastest adaptation. This problem, however, can be formulated and solved in different ways.

6

R.V. Belavkin

Optimality at a certain generation is defined by the following (instantaneous) optimal value function: f ./ WD supfE.x/ fxsCt g W t g:

(1)

.x/

Here, 0 represents a time constraint. Function f ./ is non-decreasing, and optimization problem (1) has dual representation by the inverse function f

1

./ WD inf ft 0 W E.x/ fxsCt g g: .x/

(2)

Here, is a constraint on the expected fitness at s C t. Thus, f ./ is defined as 1 the maximum adaptation in no more than generations; f ./ is defined as the minimum number of generations required to achieve adaptation . Observe that f ./ can in general have infinite values, and we can define f .1/ WD sup f .!/. 1 However, f .sup f .!// 1. Observe that optimal solutions .x/ to problems (1) or (2) depend on the constraints or (and on the initial distribution ps via T t ps D psCt ). If the objective is to derive one optimal function .x/ that can be used throughout the entire “evolution” Œs; s C t, then one can define another (cumulative) optimal value function t X F .s; t/ WD sup E.x/ fxsC g: (3) .x/ D0

This optimization problem can be formulated as a recursive series of one-step maximizations using the dynamic programming approach [6]. Also, using definitions (1) and (3), one can easily show the following inequality: F .s; t/

t X

f ./:

Ds

Given a control function .x/ and the corresponding operator T.x/ , one can compute E.x/ fxsCt g for any fitness function f .!/ and initial distribution ps WD P .xs / of its values. Observe also that this formulation uses only the values of fitness, and therefore function f .!/ may change on Œs; s C t. Solving optimization problems (1) and (3), however, is not as straightforward, because it requires the inversion of the described computations. Because we are interested in optimal as a function of xs , we can take ps D ıxs .x/, and the optimal function .x/ is given by maximizing conditional expectation E fxsCt j xs g for each xs . When P .xsCt j xs / depends sufficiently smoothly on , the necessary condition of optimality in problems (1) or (2) can be expressed using conditional expectations for each xs : d E fxsCt j xs g D d

X xsCt 2f .˝/

xsCt

d P .xsCt j xs / D 0: d

(4)

Dynamics of Information and Optimal Control of Mutation

7

If E.x/ fxt Cs g is a concave functional of .x/, then the above condition is also sufficient. In addition, if the optimal value function f ./ is strictly increasing, then t D . Unfortunately, in the general case, analytical expressions are either not available or are extremely complex, and only approximate solutions can be obtained using numerical or evolutionary techniques. One useful technique is based on absorbing Markov chains and minimization of their convergence time. Recall that a Markov chain is called absorbing if P .xsC1 D j xs D / D 1 for some states . Such states are also called absorbing, while other states are called transient. If there are n absorbing and l transient states, then the corresponding right stochastic matrix T 0 (transposed of T ) can be written in the canonical form to compute its fundamental matrix N : In 0 ; N D .Il Q/1 : T0 D RQ Here, In is the n n identity matrix representing transition probabilities between absorbing states; Q is the l l matrix of transition probabilities between transient states; R is the l n matrix of transition probabilities from transient to absorbing states; 0 is the nl matrix of zeros (probabilities of escaping from absorbing states). The sum ofP elements nij of the fundamental matrix N in i th row gives the expected time ti D j nij before the process converges into an absorbing state starting in state i . Thus, given distribution ps WD P .i / of states at time moment s, the expected time to converge into any absorbing state can be computed as follows: Eftg D

l X i D1

ti P .i / D

l l X X

nij P .i /:

(5)

i D1 j D1

The quantity above can facilitate numerical solutions to problem (1). Indeed, this problem is represented dually by problem (2) with constraint EfxsCt g , and one can assume states x as absorbing. Then, given control function .x/ and corresponding operator T.x/ , one can compute the expected time E.x/ ftg of convergence into the absorbing states. For example, we shall consider E.x/ ftg for a single absorbing state D sup f .!/. Minimization of E.x/ ftg over some family of control functions .x/ can be performed numerically.

2.2 Optimal Evolution in Information We have considered evolution on ˝ as transformations T t W ps 7! T t ps of probability measures ps WD P .x/ on values x D f .!/. These transformations are endomorphisms T t W P.X / ! P.X / of the simplex P.X / WD fp 2 M.X / W p 0 ; kpk1 D 1g

8

R.V. Belavkin

of all probability measures p WD P .x/ on X D f .˝/. Here, M.X / is the Banach space P of all real Radon measures with the norm of absolute convergence kpk1 WD jP .x/j. P Observe that expected value Efxg D x P .x/ of x D f .!/ is a linear functional f .p/ D hf; pi on P.X /. Here, f is an element of P the dual space M0 .X / with respect to the pairing h; i, defined by the sum xy. Therefore, EfxsCt g D hf; psCt i is a linear constraint in problem (2). It is attractive to consider problems (1)–(3) as linear or convex optimization problems. In theory, this can be done if one defines time-valued distance between arbitrary points in P.X / as follows: n o t.p; q/ WD inf t 0 W p D Tt q ;

where minimization is over some family T of linear endomorphisms of P.X / (i.e. some family of left stochastic matrices T ). Then problem (1) can be expressed as maximization of linear functional hf; pi subject to constraint t.p; q/ . The computation of t.p; q/, however, is even more demanding than optimization problem (2) we would like to solve. On the other hand, there exist a number of information distances I.p; q/ on P.X /, which are easily computable. For example, the total variation and Fisher’s information metrics are defined as follows [8]: IV .p; q/ WD

X

jP .x/ Q.x/j ;

IF .p; q/ WD 2 arccos

x2f .˝/

X p P .x/Q.x/: x2f .˝/

Another important example is the Kullback–Leibler divergence [13]: X P .x/ P .x/: IKL .p; q/ WD ln Q.x/

(6)

x2f .˝/

It has a number of important properties, such as additivity IKL .p1 p2 ; q1 q2 / D IKL .p1 ; q1 / C IKL .p2 ; q2 /, and optimal evolution in IKL is represented by an evolution operator [5]. Thus, given an information distance I W P P ! RC [f1g, we can define the following optimization problem: ./ WD supfEp fxg W I.p; q/ g:

(7)

p

Here, represents an information constraint. Problem (7) has dual representation by the inverse function

1

./ WD inffI.p; q/ W Ep fxg g: p

(8)

These problems, unlike (1) and (2), have exact analytical solutions, if I.p; q/ is a closed (lower semicontinuous) function of p with finite values on some neighbourhood in P.X /. For example, the necessary and sufficient optimality

Dynamics of Information and Optimal Control of Mutation

9

conditions in problem (7) are expressed using the Legendre–Fenchel transform I .f; q/ WD supp Œhf; pi I.p; q/ of I.; q/, and can be obtained using the standard method of Lagrange multipliers (see [4] for derivation). In particular, if I .; q/ is Gˆateaux differentiable, then p.ˇ/ is an optimal solution if and only if: p.ˇ/ D rI .ˇf; q/ ;

I.p.ˇ/; q/ D ;

ˇ 1 D d./=d ;

ˇ 1 > 0:

(9)

Here, rI .; q/ denotes gradient of convex function I .; q/. For example, the dual functional of IKL .p; q/ is X IKL .f; q/ WD ln ex Q.x/: (10) x2f .˝/

Substituting its gradient into conditions (9), one obtains optimal solutions to problems (7) or (8) as a one-parameter exponential family: p.ˇ/ D eˇf f .ˇ/ p.0/ ;

p.0/ D q;

(11)

.ˇf; q/ is the cumulant generating function. Its first where f .ˇ/ WD ln IKL 0 derivative x .ˇ/, in particular, is the expected value Ep.ˇ/ fxg D hf; p.ˇ/i. Equation (11) corresponds to the following differential equation:

p 0 .ˇ/ D Œf hf; p.ˇ/i p.ˇ/:

(12)

This is the replicator equation, studied in population dynamics [15]. Note that fitness function f .!/, defining the replication rate, may depend on p in a general case. One can see that optimal evolution in information divergence IKL corresponds to replicator dynamics with respect to parameter ˇ—the inverse of a Lagrange multiplier related to the information constraint as ˇ 1 D d./=d. This property is unique to information divergence IKL [5], and we shall focus in this paper on optimal evolution (11).

3 Evolution of Sequences The main object of study in this work is a discrete system ˝ of sequences representing biological or artificial organisms. Such systems, although finite, can be too large to enumerate on a digital computer, and there are an infinite number of possible evolutions of finite populations of the organisms. It is possible to factorize the system by considering the evolution only on the equivalence classes, defined by an objective function, which is what we have described in previous section. The difficulty, however, is understanding the relation between the controls, which act on and transform elements of ˝, and the factorized system ˝=. In this section, we make general considerations of this issue, and then derive specific equations for the case, when ˝ is a Hamming space of sequences.

10

R.V. Belavkin

3.1 Topological Considerations and Controls We have defined the problem of optimal control of evolution of events in ˝ as a Markov decision process, where P .xsC1 j xs / is the transition probability between different values x D f .!/ of the objective function and depending on the control parameter . The specific expression for P .xsC1 j xs / depends on the structure of the domain ˝ of the objective function and the range of possible controls . If the control is a kind of a search operator in ˝, then a structure on ˝ can facilitate the search process. Recall that ˝ is a totally pre-ordered set: a . b if and only if f .a/ f .b/. The structure on ˝ must be reach enough to embed this pre-order. For example, if is a topology on ˝, then it is desirable that the principal downsets # a WD f! . ag are closed in , while their complements ˝n # a are open. Indeed, a sequence !0 ; : : : ; !s ; : : : such that !sC1 2 ˝n # !s corresponds to a sequence of strictly increasing values xi D f .!i /. If there exists an optimal (top) element > 2 ˝ such that sup f .!/ D f .>/, then such a sequence converges to x D f .>/. Note that finite set ˝ always contains > and ? elements. Let us define the following property of the objective function f .!/, which will also clarify the terms “smooth” and “rugged” fitness landscape, used in biological literature. Let us equip ˝ with a metric d W ˝ ˝ ! Œ0; 1/, so that similarity between a and b 2 ˝ can be measured by d.a; b/. We define f to be locally monotonic relative to d . Definition 1 (Monotonic landscape). Let .˝; d / be a metric space, and let f W ˝ ! R be a function with f .>/ D sup f .!/ for some > 2 ˝. We say that f is locally monotonic (locally isomorphic) relative to metric d if for each > there exists a ball B.>; r/ WD f! W d.>; !/ rg ¤ f>g such that for all a; b 2 B.>; r/: d.>; a/ d.>; b/

H) . ” /

f .a/ f .b/:

We say that f is monotonic (isomorphic) relative to d if B.>; r/ ˝. Example 1 (Negative distance). If f is isomorphic to d , then one can replace f .!/ by the negative distance d.>; !/. The number of values of such f is equal to the number of spheres S.>; r/ WD f! W d.>; !/ D rg. One can easily show also that when f is isomorphic to d , then there is only one > element: f .>1 / D f .>2 / ” d.>2 ; >1 / D d.>2 ; >2 / D 0 ” >1 D >2 . Example 2 (Needle in a haystack). Let f .!/ be defined as f .!/ D

1 if d.>; !/ D 0; 0 otherwise:

This function is often used in studies of performance of genetic algorithms (GAs). In biological literature, > element is often referred to as the wild type, and a twovalued landscape is used to derive error threshold and critical mutation rate [15].

Dynamics of Information and Optimal Control of Mutation

11

One can check that if for each > 2 ˝ there exists B.>; r/ ¤ f>g containing only one >, then two-valued f is locally monotonic relative to any metric. Indeed, conditions of the definition above are satisfied in all such B.>; r/ ˝. If ˝ has unique >, then the conditions are satisfied for B.>; 1/ D ˝. Optimal function .x/ for such f .!/ is related to maximization of probability P .xsC1 D 1 j xs /. For monotonic f , spheres S.>; l/ cannot contain elements with different values x D f .!/. We can generalize this property to weak or -monotonicity, which requires that the variance of x D f .!/ within elements of each sphere S.>; l/ is small or does not exceed some 0. These assumptions allow us to replace f .!/ by negative distance d.>; !/ and derive expressions for transition probability P .xsC1 j xs / using topological properties of .˝; d /. Monotonicity of f depends on the choice of metric, and one can define different metrics on ˝. Generally, one prefers metric d2 to d1 if the neighbourhoods, where f is monotonic relative to d2 , are “larger” than for metric d1 : B1 .>; r/ B2 .>; r/ for all Bi .>; r/, where f is monotonic relative to di . In this respect, the least preferable is the discrete metric: d.a; b/ D 0 if a D b; 0 otherwise. We shall now consider the example of ˝ being the Hamming space, which plays an important role in theoretical biology as well as engineering problems.

3.2 Mutation and Adaptation in a Hamming Space Biological organisms are represented by DNA sequences, and reproduction involves mutation and recombination of the parent sequences. Generally, a set of sequences ˝ can be equipped with different metrics and topologies. Here, we shall consider the case when ˝ is a Hamming space H˛l WD f1; : : : ; ˛gl —a space of sequences of length l and ˛ letters and equipped with the Hamming metric d.a; b/ WD jfi W ai ¤ bi gj. We shall also consider only asexual reproduction by simple mutation, which is defined as a process of independently changing each letter in a parent sequence to any of the other ˛ 1 letters with probability =.˛ 1/. This point mutation is defined by one parameter , called the mutation rate. Assuming that fitness function f .!/ is isomorphic to the negative Hamming distance d.>; !/, we shall derive probability P .xsC1 j xs / and optimize evolution of sequences by controlling the mutation rate. This complex problem has relevance not only for engineering problems but also for biology, because the abundance of neutral mutations in nature supports an intuition that biological fitness landscapes are at least weakly locally monotonic relative to the Hamming metric. We analyse asexual reproduction by mutation in metric space H˛l using geometric considerations, which are inspired by Fisher’s geometric model of adaptation in Euclidean space [10]. Let individual a be a parent of b, and let d.a; b/ D r. We consider asexual reproduction as a transition from parent a to a random point b on a sphere S.a; r/: b 2 S.a; r/ WD f! W d.a; !/ D rg

12

R.V. Belavkin

We refer to r as a radius of mutation. Suppose that d.>; a/ D n and d.>; b/ D m. We define the following probabilities: P .r j n/ WD P .b 2 S.a; r/ j a 2 S.>; n//; P .m j r; n/ WD P .b 2 S.>; m/ j b 2 S.a; r/; a 2 S.>; n//; P .r \ m j n/ WD P .b 2 S.a; r/ \ S.>; m/ j a 2 S.>; n//; P .m j n/ WD P .b 2 S.>; m/ j a 2 S.>; n//: These probabilities are related as follows: P .m j n/ D

l X

P .r \ m j n/ D

rD0

l X

P .m j r; n/P .r j n/:

(13)

rD0

For simple mutation of sequences in H˛l , the probability that b 2 S.a; r/ is defined by binomial distribution with probability 2 Œ0; 1 of mutation depending on n D d.>; a/: ! l P .r j n/ D .n/r .1 .n//lr : (14) r Probability P .m j r; n/ is defined by the number of elements in the spheres S.a; r/, S.>; m/ and their intersection as follows: P .m j r; n/ D

jS.>; m/ \ S.a; r/jd.>;a/Dn : jS.a; r/j

(15)

The number of sequences in the intersection S.a; r/ \ S.>; m/ with condition d.>; a/ D n is computed by the following formula: jS.>; m/ \ S.a; r/jd.>;a/Dn

! ! ! X n r0 n r rC l n D .˛ 2/ .˛ 1/ ; rC r r0 (16)

where triple summation runs over r0 , rC and r satisfying conditions rC 2 Œ0; .r C m n/=2, r 2 Œ0; .n jr mj/=2, r rC D n maxfr; mg and r0 C rC C r D minfr; mg. These conditions can be obtained from metric inequalities for r, m and n (e.g. jn mj r n C m). The number of sequences in S.a; r/ H˛l is ! r l : (17) jS.a; r/j D .˛ 1/ r Equations (14)–(17) can be substituted into (13) to obtain the precise expression for transition probability P .m j n/ in Hamming space H˛l .

Dynamics of Information and Optimal Control of Mutation

13

4 Solutions for Special Cases and Simulation Results In this section, we derive optimal control functions .n/ for several special cases and then evaluate their performance. Given a mutation rate control function .n/, we can compute operator T.n/ using (13) for transition probabilities P .m j n/ in a Hamming space H˛l . Table 1 lists the expected times of convergence of the resulting processes to the optimal state x D sup f .!/, computed by (5) using corresponding absorbing Markov chain. As a reference, Table 1 reports also the expected time for a process with a constant mutation rate D 1= l, which corresponds to the error threshold [9, 15] and is sometimes considered optimal (e.g. [16]). Then we t use powers T.n/ of the Markov operators to simulate the processes on a digital computer. The examples of resulting evolutions in time for H210 are shown in Fig. 4, and Fig. 5 shows the corresponding evolutions in information.

4.1 Optimal Mutation Rate for Next Generation Let us consider mutation rate maximizing expected fitness of the next generation. This corresponds to problem (1) with D 1, and it corresponds to minimization of the following conditional expectation: E fm j ng D

l X

m P .m j n/:

mD0

Figure 1 shows level sets of E fm j ng as a function of n D d.>; a/ in H230 and different mutation rates . One can show that mutation rate optimizing the next generation is the following step function: 8 < 0 if n < l.1 1=˛/; .n/ WD 12 if n D l.1 1=˛/; : 1 otherwise:

Table 1 Expected times Eft g of convergence to optimum in Hamming spaces Hl˛ using Markov processes for different controls .n/ of mutation rate .n/ H10 H10 H30 2 4 2 2 4 Constant 1= l 16; 6 10 163; 3 10 170; 4 107 Step 1 1 1 Linear n= l 2; 5 102 14; 9 104 7; 6 107 max P .m < n j n/ 3; 8 102 19; 9 104 17; 8 107 P0 .m < n/ 13; 9 102 570; 6 104 256; 8 107

14

R.V. Belavkin 1

Mutation rate m

0.75

0.5

0.25

0

0

5

10

15

20

25

30

Distance to optimum n = d(T, a) Fig. 1 Expected value E fm j ng of distance m D d.>; b/ to optimum > 2 H30 2 after one transformation a 7! b as a function of n D d.>; a/ and mutation rate . Dashed curves show level sets of E fm j ng; solid curve shows the minimum

Clearly, the corresponding operator T.n/ is not optimal for t > 1 generations, because it does not change the distribution of sequences in H˛l , if d.>; !/ < l .1 1=˛/ for all !. In the space H2l of binary sequences, this occurs after just one generation. Thus, Fig. 4 shows no change in the expected fitness after t > 1 for this control function. Figure 5 also shows quite a significant information divergence, so that the optimal information value is not achieved. Note also that for sequences of length l > 1, this strategy has infinite expected time to converge to state m D 0 (or xsCt D sup f .!/) (see Table 1).

4.2 Maximizing Probability of Optimum Minimization of the convergence time to state m D 0 is related to maximization of probability P .m D 0 j n/, which has the following expression: P .m D 0 j n/ D .˛ 1/n n .1 /ln :

(18)

Mutation rate maximizing this probability is given by taking its derivative to zero: d P .m D 0 j n/ D .˛ 1/n n1 .1 /ln1 .n l/ D 0: d

Dynamics of Information and Optimal Control of Mutation

15

Together with d2 P =d2 0, this gives condition n l D 0 or .n/ D

n : l

(19)

This linear mutation control function has very intuitive interpretation: if sequence a has n letters different from the optimal sequence >, then substitute n letters in the offspring. One can show that the linear function (19) is optimal for two-valued fitness landscapes with one optimal sequence, such as the Needle in a Haystack discussed in Example 2. This is because expected fitness E.x/ fxsCt g in this case is completely defined by probability (18). For other fitness landscapes that are monotonic relative to the Hamming metric, function (19) can be a good approximation of optimal control in terms of (1) with large time constraint or (2) with constraint D sup f .!/. Table 1 shows good convergence times Eftg to the optimum. However, Fig. 4 shows that evolution in time is extremely slow in the initial stage, and in fact not optimal for t < Eftg. Figure 5 shows also that performance in terms of information value for this strategy is very poor.

4.3 Maximizing Probability of Success Consider the following probability: P .m < n j n/ D

n1 X

P .m j n/:

mD0

B¨ack referred to it as probability of success and derived mutation rate .n/ maximizing it for the space H2l of binary sequences [2]. Figure 2 shows this curve for H210 , and similar curves can be obtained for the general case H˛l using equations from previous section (Fig. 3). Although this strategy allows one to achieve good performance, as can be seen from Figs. 4 and 5, it does not solve optimization problems (1) or (3) in general. To see this, observe that maximization of P .m < n P j n/ is equivalent to maximization of conditional expectation E fu.m; n/ j ng D m u.m; n/P .m j n/ of a two-valued utility function u.m; n/ D

1 if m < n; 0 otherwise:

First, this function has only two values, and they depend on two arguments m D d.>; b/ and n D d.>; a/. Thus, u does not correspond to fitness functions with

16

R.V. Belavkin 1

Mutation rate m

0.75

0.5

0.25

0

0

5

10

15

20

Distance to optimum n = d(T,a)

25

30

Fig. 2 Probability of “success” P .m < n j n/ that b is closer to > 2 H30 2 than a after one transformation a 7! b as a function of n D d.>; a/ and mutation rate . Dashed curves show level sets of P .m < n j n/; solid curve shows the maximum 1

Mutation rate m

0.75

0.5

0.25

0

0

5

10

15

20

25

30

Distance to optimum n = d(T,a) Fig. 3 Probability P0 .m < n/, computed as cumulative distribution function of P0 .m/ in H30 2 , defined by (23)

more than two values, such as the negative distance in Example 1. Note also that fitness usually depends on just one argument (i.e. on the genotype of one individual). Second, the optimization is done for one transition (i.e. next generation), while we

Dynamics of Information and Optimal Control of Mutation

17

Distance to optimum n = d (T, a)

0

1 Constant 1/l Step Linear n/l maxm Pm(m < n | n) P0(m 2 H10 2 as a function of generation t (time). Different curves correspond to different controls .n/ of mutation rate

Distance to optimum n = d( T, a)

0

1

2

Const 1/l Step Linear n/l maxm Pm(m < n | n) P0(m 2 H10 2 as a function of information divergence from initial distribution. Different curves correspond to different controls .n/ of mutation rate; ./ represents theoretical optimum

are interested in a mutation rate control maximizing expected fitness after t > 1 generations. In fact, one can see from Table 1 that linear control (19) of the mutation rate gives shorter expected times of convergence into absorbing state m D 0.

18

R.V. Belavkin

4.4 Minimum Information Rate Let us consider the problem of controlling a mutation rate to maximize the evolution in information, as defined by the optimal value function ./ in (7) or its inverse (8). As stated earlier, the optimal transition kernels for these problems belong to an exponential family (11), and for the transitions in a Hamming space with f .!/ D d.>; !/, and using notation n D d.>; a/, m D d.>; b/, the transition kernel has the form Pˇ .m j n/ D eˇ.nm/.nm/ .ˇ/ P .m/:

(20)

The difference n m represents fitness value of m relative to n; expf.nm/ .ˇ/g is the normalizing factor, which depends on ˇ and n. Given an initial distribution P .n/, one can obtain its transformation P .m/ D Tˇ P .n/, where operator Tˇ is defined by transition probabilities above. Thus, the optimal value function ./ can be computed using ˇ 2 R as parameter—its argument is the information divergence IKL .P .m/; P .n//, and its values are the expected fitness Efmg D P m P .m/. An example of function ./ for H210 is shown in Fig. 5. Our task is to define a mutation control function .n/ such that the evolution defined by the corresponding Markov operator T.n/ achieves optimal values ./. Recall that given random variable .˝; F ; P /, the value h.!/ D ln P .!/ is called random entropy of outcome !. In fact, it can be computed as information divergence IKL .ı! ; P .!// D lnPP .!/ of the Dirac measure ı! . Entropy is the expected value Efh.!/g D Œln P .!/ P .!/. We can also define random information .!; / of two variables as h.!/ h.! j / D lnŒP .! j /=P .!/, and its expected value with respect to joint distribution P .!; / is Shannon’s mutual information [17]. Conditional probability can be expressed using .!; /: P .! j / D e .!;/ P .!/: Comparing this to (20), one can see that the quantity ˇ.n m/ .nm/ .ˇ/ plays a role of random information .m; n/. In fact, one can show that the Legendre–Fenchel 1 dual of f .ˇ/ is the inverse optimal value function ./ D supfˇ f .ˇ/g, and it is defined by (8) as the minimal information subject to Efxg . To see how mutation rate .n/ can be related to information, let us write transition probability (13) for a Hamming space in the exponential form: P .m j n/ D

l X rD0

er ln .n/C.lr/ lnŒ1.n/

jS.a; r/ \ S.>; m/jn : .˛ 1/r

(21)

Our experiments show that optimal values ./ are achieved if random entropy h.n/ D ln .n/ is identified with h.m < n j n/ D ln P0 .m < n/, where

Dynamics of Information and Optimal Control of Mutation

19

P0 .m < n/, shown on Fig. 3, is computed as the cumulative distribution function of the “least informed” distribution P0 .m/: .n/ D P0 .m < n/ D

n1 X

P0 .m/:

(22)

mD0

Here, the distribution P0 .m/ WD P0 .! 2 S.>; m// is obtained assuming a uniform distribution P0 .!/ D ˛ l of sequences in H˛l . Thus, P0 .m/ can be obtained by counting sequences in the spheres S.>; n/ H˛l , and it corresponds to binomial distribution with D 1 1=˛: ! ! l l .˛ 1/m m lm P0 .m/ D D : .1 / ˛l m m

(23)

In this case, Efmg D l D l.1 1=˛/. Control of mutation rate by function (22) has the following interpretation: if sequence a has n letters different from the optimal sequence >, then substitute each letter in the offspring with a probability that d.>; b/ D m < n. We refer to such control as minimum information, because it achieves the same effect as using 1 exponential probability (20) for minimal information .m; n/ D ./. Figure 5 shows that this strategy achieves almost perfectly theoretical optimal information value ./. Perhaps, even more interesting is that this strategy is optimal in the initial stages of evolution in time, as seen in Fig. 4. Table 1 shows that convergence to the optimal state is very slow. However, Fig. 4 shows that the expected fitness is higher than for any other strategy even after generation t D 250, which is the smallest expected convergence time in Table 1. Similar results were observed in other Hamming spaces. Interestingly, the performance of the minimal information strategy in terms of cumulative objective function (3) is also better than other strategies during significant part of the evolution.

5 Discussion We have considered differences between problems of optimization of evolution in time and optimization of evolution in information. These problems have been studied in relation to optimization of mutation rate in evolutionary algorithms and biological applications. Traditional approach to such problems is based on sequential optimization using methods of dynamic programming and approximate numerical solutions. However, in many practical applications the complexity overwhelms even the most powerful computers. Even in the most simple biological systems, dimensionality of the corresponding spaces of sequences and time horizon make sequential optimization intractable.

20

R.V. Belavkin

On the other hand, optimization of evolution in information can be formulated as convex optimization, and analytical solutions are often available. These solutions define performance bounds against which various algorithms can be evaluated and optimal or nearly optimal solutions can be found. Our results suggest that optimization of evolution in information can also help solve sequential optimization problems. This may provide an alternative way to tackle optimization problems, for which traditional methods have not been effective. Acknowledgements This work was supported by UK EPSRC grant EP/H031936/1.

References 1. Amari, S.I.: Differential-Geometrical Methods of Statistics. In: Lecture Notes in Statistics, vol. 25. Springer, Berlin (1985) 2. B¨ack, T.: Optimal mutation rates in genetic search. In: Forrest, S. (ed.) Proceedings of the 5th International Conference on Genetic Algorithms, pp. 2–8. Morgan Kaufmann (1993) 3. Belavkin, R.V.: Bounds of optimal learning. In: 2009 IEEE International Symposium on Adaptive Dynamic Programming and Reinforcement Learning, pp. 199–204. IEEE, Nashville, TN, USA (2009) 4. Belavkin, R.V.: Information trajectory of optimal learning. In: Hirsch, M.J., Pardalos, P.M., Murphey, R. (eds.) Dynamics of Information Systems: Theory and Applications, Springer Optimization and Its Applications Series, vol. 40. Springer, Berlin (2010) 5. Belavkin, R.V.: On evolution of an information dynamic system and its generating operator. Optimization Letters (2011). DOI:10.1007/s11590-011-0325-z 6. Bellman, R.E.: Dynamic Programming. Princeton University Press, Princeton, NJ (1957) 7. Bernstein, D.S., Hyland, D.C.: The optimal projection/maximum entropy approach to designing low-order, robust controllers for flexible structures. In: Proceedings of 24th Conference on Decision and Control, pp. 745–752. Ft. Lauderdale, FL (1985) 8. Chentsov, N.N.: Statistical Decision Rules and Optimal Inference. Nauka, Moscow, U.S.S.R. (1972). In Russian, English translation: Providence, RI: AMS, 1982 9. Eigen, M., McCaskill, J., Schuster, P.: Molecular quasispecies. J. Phys. Chem. 92, 6881–6891 (1988) 10. Fisher, R.A.: The Genetical Theory of Natural Selection. Oxford University Press, Oxford (1930) 11. Kaelbling, L.P., Littman, M.L., Moore, A.W.: Reinforcement learning: A survey. J. Artif. Intell. Res. 4, 237–285 (1996) 12. Kalman, R.E., Bucy, R.S.: New results in linear filtering and prediction theory. Trans. ASME Basic Eng. 83, 94–107 (1961) 13. Kullback, S., Leibler, R.A.: On information and sufficiency. Ann. Math. Stat. 22(1), 79–86 (1951) 14. Nix, A.E., Vose, M.D.: Modeling genetic algorithms with Markov chains. Ann. Math. Artif. Intell. 5(1), 77–88 (1992) 15. Nowak, M.A.: Evolutionary Dynamics: Exploring the Equations of Life. Harvard University Press, Cambridge (2006) 16. Ochoa, G.: Setting the mutation rate: Scope and limitations of the 1= l heuristics. In: Proceedings of Genetic and Evolutionary Computation Conference (GECCO-2002), pp. 315–322. Morgan Kaufmann, San Francisco, CA (2002) 17. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 and 623–656 (1948)

Dynamics of Information and Optimal Control of Mutation

21

18. Stratonovich, R.L.: Optimum nonlinear systems which bring about a separation of a signal with constant parameters from noise. Radiofizika 2(6), 892–901 (1959) 19. Stratonovich, R.L.: On value of information. Izv. USSR Acad. Sci. Tech. Cybern. 5, 3–12 (1965) (In Russian) 20. Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. Adaptive Computation and Machine Learning. MIT Press, Cambridge, MA (1998) 21. Tsypkin, Y.Z.: Foundations of the Theory of Learning Systems. In: Mathematics in Science and Engineering. Academic, New York (1973) 22. Yanagiya, M.: A simple mutation-dependent genetic algorithm. In: Forrest, S. (ed.) Proceedings of the 5th International Conference on Genetic Algorithms, p. 659. Morgan Kaufmann (1993)

Integration Principle as the Master Equation of the Dynamics of an Information System Victor Korotkikh and Galina Korotkikh

Abstract In the paper we consider the hierarchical network of prime integer relations as a system of information systems. The hierarchical network is presented by the unity of its two equivalent forms, i.e., arithmetical and geometrical. In the geometrical form a prime integer relation becomes a two-dimensional pattern made of elementary geometrical patterns. Remarkably, a prime integer relation can be seen as an information system itself functioning by the unity of the forms. Namely, while through the causal links of a prime integer relation the information it contains is instantaneously processed and transmitted, the elementary geometrical patterns take the shape to simultaneously reproduce the prime integer relation geometrically. Since the effect of a prime integer relation as an information system is entirely given by the two-dimensional geometrical pattern, the information can be associated with its area. We also consider how the quantum of information of a prime integer relation can be represented by using space and time as dynamical variables. Significantly, the holistic nature of the hierarchical network makes it possible to formulate a single universal objective of a complex system expressed in terms of the integration principle. We suggest the integration principle as the master equation of the dynamics of an information system in the hierarchical network. Keywords Information system • Prime integer relation • Quantum of information • Complexity • Integration principle

V. Korotkikh () • G. Korotkikh School of Information and Communication Technology CQUniversity, Mackay, QLD 4740, Australia e-mail: [email protected]; [email protected] A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 2, © Springer Science+Business Media New York 2012

23

24

V. Korotkikh and G. Korotkikh

1 Introduction In the paper we consider the hierarchical network of prime integer relations as a system of information systems. For this purpose in Sect. 2 we present the hierarchical network by the unity of its two equivalent forms, i.e., arithmetical and geometrical. In particular, we discuss that in the geometrical form a prime integer relation becomes a two-dimensional pattern made of elementary geometrical patterns. Remarkably, a prime integer relation can be seen as an information system functioning by the unity of two forms. Namely, while through the causal links of a prime integer relation the information is instantaneously processed and transmitted for the prime integer relation to be defined, the elementary geometrical patterns take the shape to simultaneously reproduce the prime integer relation geometrically. Therefore, a prime integer relation has a very important property to process and transmit information to the parts so that they can operate together for the system to exist and function as a whole. Since the effect of a prime integer relation as an information system is entirely given by the two-dimensional geometrical pattern, the information can be associated with the geometrical pattern and its area in particular. This suggests that in a prime integer relation the information is made of quanta given by the elementary geometrical patterns and measured by their areas. In Sect. 3 we consider how the quantum of information of a prime integer relation can be represented by using space and time as dynamical variables. In Sect. 4 we discuss that the holistic nature of the hierarchical network makes it possible to formulate a single universal objective of a complex system expressed in terms of the integration principle. We suggest the integration principle as the master equation of the dynamics of an information system in the hierarchical network.

2 The Hierarchical Network of Prime Integer Relations as a System of Information Systems The hierarchical network has been defined within the description of complex systems in terms of self-organization processes of prime integer relations [1–7]. Remarkably, in the hierarchical network arithmetic and geometry are unified by two equivalent forms, i.e., arithmetical and geometrical. At the same time, the arithmetical and geometrical forms play the different roles. For example, while the arithmetical form sets the relationships between the parts of a system, the geometrical form makes it possible to measure the effect of the relationships on the parts. In the arithmetical form the hierarchical network comes into existence by the totality of the self-organization processes of prime integer relations. Starting with

Integration Principle as the Master Equation of the Dynamics: : :

25

the integers the processes build the hierarchical network under the control of arithmetic as one harmonious and interconnected whole, where not even a minor change can be made to any of its elements. In the description a complex system is defined by a number of global quantities conserved under self-organization processes. The processes build hierarchical structures of prime integer relations, which determine the system. Importantly, since a prime integer relation expresses a law between the integers, the complex system becomes governed by the laws of arithmetic realized by the self-organization processes of prime integer relations. Remarkably, a prime integer relation of any level can be considered as a complex system itself. Indeed, it is formed by a process from integers as the initial building blocks and then from prime integer relations of the levels below with the relationships set by arithmetic. Because each and every element in the formation is necessary and sufficient for the prime integer relation to exist, we call such an integer relation prime. In the geometrical form the formation of a prime integer relation can be isomorphically represented by the formation of two-dimensional geometrical patterns [1–3]. In particular, in the geometrical form a prime integer relation, as well as a corresponding law of arithmetic, becomes expressed by a two-dimensional geometrical pattern made of elementary geometrical patterns, i.e., the quanta of the prime integer relation. Notably, when the areas of the elementary geometrical patterns are calculated they turn out to be quantized [8–10]. Due to the isomorphism of the forms, the relationships in a prime integer relation determine the shape of the elementary patterns to make the whole geometrical pattern. Strictly controlled by arithmetic, the shapes of the elementary geometrical patterns cannot be changed even a bit without breaking the relationships and thus the prime integer relation. Significantly, a prime integer relation can be seen as an information system functioning through the unity of the forms. In particular, while through the causal links of a prime integer relation the information it contains is instantaneously processed and transmitted for the prime integer to become defined, the elementary geometrical patterns take the shape to simultaneously reproduce the prime integer relation geometrically. Since the effect of a prime integer relation as an information system is entirely given by the two-dimensional geometrical pattern, the information can be associated with the geometrical pattern and its area in particular. This suggests that in a prime integer relation the information is made of quanta given by the elementary geometrical patterns and measured by their areas [10]. As a result, a concept of information based on the self-organization processes of prime integer relations and thus arithmetic can be defined. Now let us illustrate the general results. It has been shown that if under the transition from one state s D s1 : : : sN to another state s 0 D s10 : : : sN0 at level 0 k 1 quantities of the complex system remain invariant, then k Diophantine equations

26

V. Korotkikh and G. Korotkikh

.m C N /k1 s1 C .m C N 1/k1 s2 C C .m C 1/k1 sN D 0; :

:

:

:

:

.m C N / s1 C .m C N 1/ s2 C C .m C 1/1 sN D 0; 1

1

.m C N /0 s1 C .m C N 1/0 s2 C C .m C 1/0 sN D 0

(1)

and an inequality .m C N /k s1 C .m C N 1/k s2 C : : : C .m C 1/k sN ¤ 0

(2)

take place [1–3]. In particular, it is assumed that in the state s D s1 : : : sN there are jsi j of integers mCN i C1; i D 1; : : : ; N “charged” positively, if si > 0, or “charged” negatively, if si < 0. Similarly, in the state s 0 D s10 : : : sN0 there are jsi0 j of integers m C N i C 1; i D 1; : : : ; N “charged” positively, if si0 > 0, or “charged” negatively, if si0 < 0. At the same time m and N; N 2 are integers and si D si0 si ; i D 1; : : : ; N; where si ; si0 2 I and I is a set of integers. Notably, integers m C N; m C N 1; : : : ; m C 1 appear as the initial building blocks of the system and to make the transition from the state s D s1 : : : sN to the state s 0 D s10 : : : sN0 it is required that jsi j of integers m C N i C 1; i D 1; : : : ; N have to be generated from the “vacuum” positively “charged,” if si > 0, or “charged” negatively, if si < 0. Let us consider the Diophantine equations (1) when the PTM (Prouhet-ThueMorse) sequence of length N D C1 1 1 C 1 1 C 1 C 1 1 : : : D 1 : : : N specifies a solution si D i ; i D 1; : : : ; N for N D 2k ; k D 1; 2; : : : : Namely, in this case the Diophantine equations (1) and inequality (2) become N k1 1 C .N 1/k1 2 C C 1k1 N D 0; :

:

:

:

N 1 1 C .N 1/1 2 C C 11 N D 0; N 0 1 C .N 1/0 2 C C 10 N D 0

(3)

Integration Principle as the Master Equation of the Dynamics: : :

27

and N k 1 C .N 1/k 2 C C 1k N ¤ 0;

(4)

where m D 0. For example, when N D 16 we can explicitly write (3) and (4) as C163 153 143 C 133 123 C 113 C 103 93 83 C 73 C 63 53 C 43 33 23 C 13 D 0 C162 152 142 C 132 122 C 112 C 102 92 82 C 72 C 62 52 C 42 32 22 C 12 D 0 C161 151 141 C 131 121 C 111 C 101 91 81 C 71 C 61 51 C 41 31 21 C 11 D 0 C160 150 140 C 130 120 C 110 C 100 90 80 C 70 C 60 50 C 40 30 20 C 10 D 0

(5)

and C 164 154 144 C 134 124 C 114 C 104 94 84 C 74 C 64 54 C 44 34 24 C 14 ¤ 0:

(6)

Next we consider one of the self-organization processes of prime integer relations that can be associated with the system of integer relations (5) and inequality (6). The self-organization process starts as integers 16; : : : ; 1 are generated from the “vacuum” to appear at level 0 positively or negatively “charged” depending on the sign of the corresponding element in the PTM sequence. Then the integers combine into pairs and make up the prime integer relations of level 1. Following a single organizing principle [1–3] the process continues as long as arithmetic allows the prime integer relations of a level to form the prime integer relations of the higher level (Fig. 1). In the geometrical form, which is specified by two parameters " 1 and ı 1, the self-organization process become isomorphically represented by transformations of two-dimensional patterns (Fig. 2). Remarkably, under the isomorphism a prime integer relation turns into a corresponding geometrical pattern, which can be viewed as the prime integer relation itself, but only expressed geometrically. At level 0 the geometrical pattern of integer 16 i C 1; i D 1; : : : ; 16 is given by the region enclosed by the boundary curve, i.e., the graph of the function Œ0

1 .t/ D i ı; ti 1 t < ti ; the vertical lines t D ti 1 ; t D ti and the t-axis, where tj D j"; j D 0; : : : ; 16.

28

V. Korotkikh and G. Korotkikh

Fig. 1 The hierarchical structure of prime integer relations built by the process

At level l D 1; 2; 3; 4 the geometrical pattern of the i th i D 1; : : : ; 24l prime integer relation is defined by the region enclosed by the boundary curve, i.e., the graph of the function Œl

1 .t/; t2l .i 1/ t t2l i ; and the t-axis. As the integers of level l D 0 or the prime integer relations of level l D 1; 2; 3 form the prime integer relations of level l C 1, under the integration of the function Œl

1 .t/; t0 t t16 subject to ŒlC1

1

.t0 / D 0;

the geometrical patterns of level l transform into the geometrical patterns of level l C 1. Remarkably, the geometrical pattern of a prime integer relation is composed of elementary geometrical patterns, i.e., the quanta of the prime integer relation. For example, the i th i D 1; : : : ; 8 elementary geometrical pattern of the prime integer relation C162 152 142 C 132 122 C 112 C 102 92 D 0

Integration Principle as the Master Equation of the Dynamics: : :

29

Fig. 2 The hierarchical structure of geometrical patterns

is the region enclosed by the boundary curve, i.e., the graph of the function Œ3

1 .t/; ti 1 t ti ; the vertical lines t D ti 1 ; t D ti and the t-axis. Significantly, the areas of the elementary geometrical patterns of a prime integer relation turn out to be quantized. For instance, the areas of the elementary geometrical patterns G14 ; : : : ; G16;4 of the prime integer relation C163 153 143 C 133 123 C 113 C 103 93 83 C 73 C 63 53 C 43 33 23 C 13 D 0

30

V. Korotkikh and G. Korotkikh

produce a discrete spectrum of quantized values A.G14 /; : : : ; A.G16;4 / D

1 29 149 361 599 811 931 959 ; ; ; ; ; ; ; ; 120 120 120 120 120 120 120 120 959 931 811 599 361 149 29 1 ; ; ; ; ; ; ; ; 120 120 120 120 120 120 120 120

when " D 1 and ı D 1 [9, 10]. Notably, the area A.Gi 4 / of an elementary geometrical pattern Gi 4 ; i D1; : : : ; 16 can be given by the equation A.Gi 4 / D h.Gi 4 /; where hD

1 120

and .Gi 4 / is a corresponding number. When the prime integer relation becomes defined, the amount of information I.Gi 4 / processed and transmitted to the i th elementary geometrical pattern Gi 4 ; i D 1; : : : ; 16 is given by the area of the geometrical pattern I.Gi 4 / D A.Gi 4 /: Now, let us illustrate the processing and transmission of information by using a prime integer relation 21 s1 C 11 s2 C 01 s3 D 0

(7)

of level 2, where s1 D C1; s2 D 2, and s3 D C1. The prime integer relation (7) is formed from a prime integer relation 20 s1 C 10 s2 C 00 s3 D 0

(8)

of level 1. The integer relation (8) is prime by definition, because all integers, i.e., one positively “charged” integer 2, two negatively “charged” integers 1, as one indivisible block, and one positively “charged” integer 0, are necessary and sufficient for the formation of the prime integer relation. Next we consider an integer relation 21 s1 C 11 s2 D 0;

(9)

where, in comparison with (7), the term 01 s3 is hidden. We can rewrite (9) as 21 s1 D 11 s2 :

(10)

Although the integer relation (9) simplifies things, yet in our illustration it gives an interesting interpretation of the equals sign.

Integration Principle as the Master Equation of the Dynamics: : :

31

In particular, as soon as the integer relation (9) becomes operational by setting s2 D 2, we can see from (10) that the information is instantaneously processed and through the equals sign, working and looking like a channel, transmitted for s1 to be set s1 D 1, so that the parts can simultaneously give rise to the integer relation 21 1 C 11 .2/ D 0 emerging as one whole. Therefore, a prime integer relation, as an information system, has a very important property. Namely, a prime integer relation has the power to process and transmit information to the parts, so that they can operate together for the system to exist and function as a whole. Remarkably, this property of the prime integer relation can be expressed in terms of space and time as dynamical variables [8–10]. A quantum of a prime integer relation, as a quantum of information, is given by an elementary geometrical pattern fully defined by the boundary curve and the area. Therefore, the representation of the quantum of information can be done by the representation of the boundary curve and the area of the geometrical pattern. For this purpose an elementary part could come into existence. In particular, once the boundary curve is specified by the space and time variables of the elementary part and the area associated with its energy, the quantum of information becomes represented by the elementary part. As a result, the law of motion of the elementary part is determined by the law of arithmetic the prime integer relation realizes. Significantly, the area of the geometrical pattern of a prime integer relation can be conserved under a renormalization. Therefore, the energy becomes an important variable of the representation [8–10]. For example, in Fig. 2 the renormalization is illustrated by a function Œ1

2 .t/; t0 t t16 : Notably, the area of the geometrical pattern of the prime integer relation C163 153 143 C 133 123 C 113 C 103 93 83 C 73 C 63 53 C 43 33 23 C 13 D 0 remains the same under the renormalization Zt16 t0

Œ4 1 .t/dt

Zt16 D

Œ1

2 .t/dt t0

and thus the energy of the elementary parts representing the prime integer relation by their space and time variables is conserved.

32

V. Korotkikh and G. Korotkikh

3 Representation of the Quantum of Information by Space and Time as Dynamic Variables Now let us consider how the quantum of information of a prime integer relation can be represented by using space and time as dynamical variables [8–10]. Figure 1 shows that in the arithmetical form there are no relationships between the integers at level 0. On the other side, in the geometrical form (Fig. 2) the boundary curve of the geometrical pattern of integer 16 i C 1; i D 1; : : : ; 16 is given by the piecewise constant function Œ0

1 .t/; ti 1 t < ti and can be represented by the space Xi 0 and Ti 0 time variables of an elementary part Pi 0 . Namely, as the elementary part Pi 0 makes transition from one state into another at the moment Ti 0 .ti 1 / D 0 of its local time the space variable Xi 0 .ti 1 / of the elementary part Pi 0 changes by Œ0

Xi 0 D 1 .ti 1 / D i ı and then stays as it is, while the time variable Ti 0 .t/; ti 1 t < ti ; changes independently as the length of the boundary curve v Zt u u t1 C Ti 0 .t/ D Ti 0 .t/ Ti 0 .ti 1 / D Ti 0 .t/ D

Œ0

d1 .t 0 / dt 0

!2 dt 0 ;

ti 1

where

v Zt u u t1 C Ti 0 D lim t !ti

Œ0

d1 .t 0 / dt 0

!2 dt 0 D ":

ti 1

Under the integration of the function Œl

1 .t/; l D 0; 1; 2; 3; t0 t t16 ; subject to ŒlC1

1

.t0 / D 0;

the geometrical patterns of the integers of level l D 0 and the prime integer relations of level l D 1; 2; 3 transform into the geometrical patterns of the prime integer

Integration Principle as the Master Equation of the Dynamics: : :

33

relations of level l C1. As a result, the boundary curve of an elementary geometrical pattern Gi l ; i D 1; : : : ; 16, i.e., the graph of the function Œl

1 .t/; ti 1 t ti ; transforms into the boundary curve of an elementary geometrical pattern Gi;lC1 , i.e., the graph of the function ŒlC1

1

.t/; ti 1 t ti :

Defined at levels 1; 2; 3; 4 elementary parts represent the boundary curves of the geometrical patterns by their space and time variables [8–10]. In particular, at level 1 the space variable Xi1 .t/ and the time variable Ti1 .t/; ti 1 t ti of an elementary part Pi1 ; i D 1; : : : ; 16 become linearly dependent and characterize the motion of the elementary part Pi1 by Ti1 .t/ sin ˛i D Xi1 .t/;

(11)

where Œ1

Œ1

Xi1 .t/ D Xi1 .t/ Xi1 .ti 1 / D 1 .t/ 1 .ti 1 /; v s !2 Zt u Zt Œ1 u d1 .t 0 / dXi1 .t 0 / 2 0 t 0 Ti1 .t/ D 1C dt D 1C dt dt 0 dt 0 ti 1

ti 1

and the angle ˛i is given by Œ0

tan ˛i D 1 .ti 1 /: Let Xi1 D Xi1 .ti / Xi1 .ti 1 / and, since Ti1 .ti 1 / D 0, Ti1 D Ti1 .ti / Ti1 .ti 1 / D Ti1 .ti /: The velocity Vi1 .t/; ti 1 t ti of the elementary part Pi1 , as a dimensionless quantity, can be defined by Xi1 .t/ : (12) Vi1 .t/ D Ti1 .t/ Using (11) and (12), we obtain Vi1 .t/ D sin ˛i

34

V. Korotkikh and G. Korotkikh

and, since the angle ˛i is constant, the velocity Vi1 .t/ must also stay constant Vi1 .t/ D Vi1 : By definition 1 sin ˛i 1, so we have 1 Vi1 1:

(13)

Since the velocity Vi1 is a dimensionless quantity, the condition (13) determines a velocity limit c [9, 10]. Therefore, the dimensional velocity vi1 of the elementary part Pi1 can be given by vi1 (14) Vi1 D sin ˛i D c and thus jvi1 j c. Now let us consider how the times Ti 0 and Ti1 of the elementary parts Pi 0 and Pi1 ; i D 1; : : : ; 16 are connected. From Fig. 2 we can find that Ti1 j cos ˛i j D Ti 0 and, by using (14), we get Ti 0 Ti1 D q : v2i1 1 c2

(15)

Since the motions of the elementary parts Pi 0 and Pi1 have to be realized simultaneously, then, according to (15), the time Ti1 .t/ of the elementary part Pi1 runs faster than the time Ti 0 .t/; ti 1 t ti of the elementary part Pi 0 . Remarkably, (15) symbolically reproduces the well-known formula connecting the elapsed times in the moving and the stationary systems [11] and allows its interpretation. In particular, as long as one tick of the clock of the moving elementary part Pi1 takes longer Ti1 > Ti 0 than one tick of the clock of the stationary elementary part Pi 0 , then the time in the moving system will be less than the time in the stationary system. Notably, at level 1 the motion of the elementary part Pi1 has the invariant Ti12 Xi12 D "2 ;

(16)

where features of the Lorentz invariant can be recognized. Significantly, in the representation of the boundary curve the space and time variables of an elementary part Pi l ; i D 1; : : : ; 16 at level l D 2; 3; 4 become interdependent. As a result, the boundary curve can be seen as their joint entity defining the local spacetime of the elementary part Pi l . For the sake of consistency, we consider that the boundary curves at level l D 0; 1 also define the local spacetimes of the elementary parts.

Integration Principle as the Master Equation of the Dynamics: : :

35

In particular, in the representation of the boundary curve given by the graph of the function Œl

1 .t/; ti 1 t ti ; i D 1; : : : ; 16; l D 2; 3; 4 the space variable Xi l .t/ of the elementary part Pi l is defined by Œl

Xi l .t/ D 1 .t/; ti 1 t ti :

(17)

In its turn the time variable Ti l .t/ of the elementary part Pi l is defined by the length of the curve v Zt u u t1 C Ti l .t/ D ti 1

Zt D

s

Œl

d1 .t 0 / dt 0

1C

dXi l .t 0 / dt 0

!2 dt 0

2

dt 0 ; ti 1 t ti :

(18)

ti 1 Œl

As a result of (18) and the character of the function 1 .t/, the space Xi l .t/ and time Ti l .t/ variables become interdependent [8–10]. Moreover, the motion of the elementary part Pi l can be defined by the change of the space variable Xi l .t/ with respect to the time variable Ti l .t/. Namely, as the time variable Ti l .t/ changes by v Zt u u t1 C Ti l .t/ D ti 1

Zt

s

D

Œl

d1 .t 0 / dt 0

1C

dXi l .t 0 / dt 0

!2

2

dt 0

dt 0 ;

ti 1

the space variable Xi l .t/ changes by Œl

Œl

Xi l .t/ D 1 .t/ 1 .ti 1 /: By using (18), we can find that the motion of an elementary part Pi l ; i D 1; : : : ; 16; l D 2; 3; 4 has the following invariant

dTi l .t/ dt

2

dXi l .t/ dt

2

D 1;

while the invariant (16) can be seen as its special case.

36

V. Korotkikh and G. Korotkikh

Therefore, we have considered how the quanta of information of the prime integer relations can be represented by the local spacetimes of elementary parts. Figure 2 helps us to understand the resulting structure of the local spacetimes and illustrates how the simultaneous realization of the prime integer relations, as a solution to the Diophantine equations (3), becomes expressed by using space and time variables. Namely, as the prime integer relations turn to be operational, then in the representation of the quanta of information of the prime integer relations the elementary parts of all levels become instantaneously connected and move simultaneously, so that their local spacetimes can reproduce the prime integer relations geometrically. Thus, the self-organization process of prime integer relations can define a complex information system whose representation in space and time determines the dynamics of the parts preserving the system as a whole.

4 Integration Principle as the Master Equation of the Dynamics of an Information System The holistic nature of the hierarchical network allows us to formulate a single universal objective of a complex system expressed in terms of the integration principle [12–16]: In the hierarchical network of prime integer relations a complex system has to become an integrated part of the corresponding processes or the larger complex system. Significantly, the integration principle determines the general objective of the optimization of a complex system in the hierarchical network. In the realization of the integration principle the geometrical form of the description can play a special role. In particular, the position of a system in the corresponding processes can be associated with a certain two-dimensional shape, which the geometrical pattern of the optimized system has to take precisely to satisfy the integration principle. Therefore, in the realization of the integration principle it is important to compare the current geometrical pattern of the system with the one required for the system by the integration principle. Since the geometrical patterns are two-dimensional, the difference between their areas can be used to estimate the result. Moreover, the fact that in the hierarchical network processes progress level by level in one and the same direction and, as a result, make a system more and more complex, suggests a possible way for the efficient realization of the integration principle. Namely, as the complexity of a system increases level by level, the area of its geometrical pattern may monotonically become larger and larger. Consequently, with each next level l < k the geometrical pattern of the system would fit better into

Integration Principle as the Master Equation of the Dynamics: : :

37

the geometrical pattern specified by the integration principle at level k and deviate more after. In its turn, the performance of the optimized system could increase to attain the global maximum at level l D k. Therefore, the performance of the system might behave as a concave function of the complexity with the global maximum at level k specified by the integration principle. Extensive computational experiments have been successfully conducted to test the prediction. Moreover, the experiments not only support the claim, but also suggest that the integration principle of a complex system could be efficiently realized in general [12, 13]. Let us consider the integration principle in the context of optimization of NP-hard problems. For this purpose an algorithm A, as a complex system of n computational agents, has been used to minimize the average distance in the travelling salesman problem (TSP). In the algorithm all agents start in the same city and choose the next city at random. Then at each step an agent visits the next city by using one of the two strategies: random or greedy. In the solution of a problem with N cities the state of the agents at step j D 1; : : : ; N 1 can be specified by a binary sequence s1j : : : snj , where sij D C1, if agent i D 1; : : : ; n uses the random strategy and sij D 1, if the agent uses the greedy strategy, i.e., the strategy to visit the closest city. The dynamics of the system is realized by the strategies the agents choose step by step and can be encoded by the strategy matrix S D fsij ; i D 1; : : : ; n; j D 1; : : : ; N 1g: In the experiments the complexity of the algorithm has been tried to be changed monotonically by forcing the system to make the transition from regular behavior to chaos by period doubling. To control the system in this transition a parameter #; 0 # 1 has been introduced. It specifies a threshold point dividing the interval of current distances travelled by the agents into two parts, i.e., successful and unsuccessful. This information is required for an optimal if-then rule [17] each agent uses to choose the next strategy. The rule relies on the PTM sequence and has the following description: 1. If the last strategy is successful, continue with the same strategy. 2. If the last strategy is unsuccessful, consult PTM generator which strategy to use next. Remarkably, it has been found that for any problem p from a class P the performance of the algorithm behaves as a concave function of the control parameter with the global maximum at # .p/. The global maximums f# .p/; p 2 Pg have been then probed to find out whether the complexities of the algorithm and the problem are related. For this purpose the strategy matrices fS.# .p//; p 2 Pg corresponding to the global maximums f# .p/; p 2 Pg to characterize the geometrical pattern of the algorithm and its complexity have been tried.

38

V. Korotkikh and G. Korotkikh

In particular, the area of the geometrical pattern and the complexity C.A.p// of the algorithm A are approximated by the quadratic trace C.A.p// D

n 1 1 X 2 2 t r.V .# .p/// D n2 n2 i D1 i

of the variance–covariance matrix V.# .p// obtained from the strategy matrix S.# .p//, where i ; i D 1; : : : ; n are the eigenvalues of V.# .p//. On the other side, the area of the geometrical pattern and the complexity C.p/ of the problem p are approximated by the quadratic trace C.p/ D

N 1 X 02 1 2 t r.M .p// D N2 N 2 i D1 i

of the normalized distance matrix M.p/ D fdij =dmax ; i; j D 1; : : : ; N g; where 0i ; i D 1; : : : ; N are the eigenvalues of M.p/, dij is the distance between cities i and j and dmax is the maximum of the distances. To reveal a possible connection between the complexities the points with the coordinates fx D C.p/; y D C.A.p//; p 2 Pg have been considered. Remarkably, the result indicates a linear dependence between the complexities and suggests the following optimality condition of the algorithm [13]. If the algorithm A demonstrates the optimal performance for a problem p, then the complexity C.A.p// of the algorithm is in the linear relationship C.A.p// D 0:67C.p/ C 0:33 with the complexity C.p/ of the problem p. According to the optimality condition, if the optimal performance takes place, then the complexity of the algorithm has to be in a certain linear relationship with the complexity of the problem. The optimality condition can be a practical tool. Indeed, for a given problem p, by using the normalized distance matrix M.p/, we can calculate the complexity C.p/ of the problem p and from the optimality condition find the complexity C.A.p// of the algorithm A. Then, to obtain the optimal performance of the algorithm A for the problem p, we only need to adjust the control parameter # for the algorithm to work with the required complexity. Since the geometrical pattern of a system is used to define the complexity of the system, the optimality condition may be interpreted in terms of the integration principle. Namely, when the algorithm shows the optimal performance

Integration Principle as the Master Equation of the Dynamics: : :

39

for a problem, the geometrical pattern of the algorithm may fit exactly into the geometrical pattern of the problem. Therefore, the algorithm, as a complex system, may become an integrated part of the processes characterizing the problem. Now let us discuss the computational results in the context of the development of efficient quantum algorithms. The main idea of quantum algorithms is to make use of quantum entanglement, which, as a physical phenomenon, has not been well understood so far. Moreover, the sensitivity of quantum entanglement is not technologically tamed to support the computations [18]. Conceptually, in a quantum TSP algorithm the wave function has to be evolved to maximize the probability of the shortest routes to be measured. However, it is still unknown how to run the evolution in order to make a quantum algorithm efficient. In particular, although the majorization principle [19] suggests a local navigation, it does not specify the properties of the global performance landscape of the algorithm that could make it efficient. By contrast, our approach proposes to explain quantum entanglement in terms of the nonlocal correlations determined by the self-organization processes of prime integer relations. Moreover, according to the description the wave function of a system encodes information about the self-organization processes of prime integer relations the system is defined by [9]. Furthermore, the computational experiments raise the possibility that following the one and the same direction of the processes, the global performance landscape of an algorithm can be made remarkably concave for the algorithm to become efficient. To have a connection with the quantum case the average distance produced by the algorithm A solving a TSP problem can be written as a function of the control parameter # 1 N D.#/ D .1;:::;N 1 .#/d.Œ1; : : : ; N 1 >/ C : : : n CN 1;:::;1 .#/d.ŒN 1; : : : ; 1 >//; where i1 ;:::;iN 1 .#/ is the number of agents using the route Œi1 ; : : : ; iN 1 >, d.Œi1 ; : : : ; iN 1 >/ is the distance of the route and the N cities of the problem are labeled by 0; 1; : : : ; N 1 with 0 for the initial city. The interpretation of the coefficient i1 ;:::;iN 1 .#/ n as the probability of the route Œi1 ; : : : ; iN 1 > may reduce the minimization of the average distance in the algorithm A to the maximization of the probability of the shortest routes to be measured in a quantum algorithm. Moreover, common features of the algorithm A and Shor’s algorithm for integer factorization [20] have been also identified [15].

40

V. Korotkikh and G. Korotkikh

5 Conclusion In the paper we have considered the hierarchical network of prime integer relations as a system of information systems and suggested the integration principle as the master equation of the dynamics of an information system in the hierarchical network. Remarkably, once the integration principle of an information system is realized, the geometrical pattern of the system could take the shape of the geometrical pattern of the problem, while the structures of the information system and the problem would become identical. We hope that the integration principle could open a new way to solve complex problems efficiently [21, 22].

References 1. Korotkikh, V.: Integer Code Series with Some Applications in Dynamical Systems and Complexity. Computing Centre of the Russian Academy of Sciences, Moscow (1993) 2. Korotkikh, V.: A symbolic description of the processes of complex systems. J. Comput. Syst. Sci. Int. 33, 16–26 (1995) translation from Izv. Ross. Akad. Nauk, Tekh. Kibern, 1, 20–31 (1994) 3. Korotkikh, V.: A Mathematical Structure for Emergent Computation. Kluwer Academic Publishers, Dordrecht (1999) 4. Korotkikh, V., Korotkikh, G.: Description of complex systems in terms of self-organization processes of prime integer relations. In: Novak, M.M. (ed.) Complexus Mundi: Emergent Patterns in Nature, pp. 63–72. World Scientific, New Jersey (2006). Available via arXiv:nlin/0509008 5. Korotkikh, V.: Towards an irreducible theory of complex systems. In: Pardalos, P., Grundel, D., Murphey, R., Prokopyev, O. (eds.) Cooperative Networks: Control and Optimization, pp. 147–170. Edward Elgar Publishing, Cheltenham (2008) 6. Korotkikh, V., Korotkikh, G.: On irreducible description of complex systems. Complexity 14(5) 40–46 (2009) 7. Korotkikh, V., Korotkikh, G.: On an irreducible theory of complex systems. In: Minai, A., Braha, D., Bar-Yam, Y. (eds.) Unifying Themes in Complex Systems, pp. 19–26. Springer: Complexity, New England Complex Systems Institute book series, Berlin (2009) 8. Korotkikh, V.: Arithmetic for the unification of quantum mechanics and general relativity. J. Phys. Conf. 174, 012055 (2009) 9. Korotkikh, V.: Integers as a key to understanding quantum mechanics. In: Khrennikov, A. (ed.) Quantum Theory: Reconsideration of Foundations - 5, pp. 321–328. AIP Conference Proceedings, vol. 1232, New York (2010) 10. Korotkikh, V.: On possible implications of self-organization processes through transformation of laws of arithmetic into laws of space and time. arXiv:1009.5342v1 11. Einstein, A.: Relativity: The Special and the General Theory - A Popular Exposition. Routledge, London (1960) 12. Korotkikh, G., Korotkikh, V.: On the role of nonlocal correlations in optimization. In: Pardalos, P., Korotkikh, V. (eds.) Optimization and Industry: New Frontiers, pp. 181–220. Kluwer Academic Publishers, Dordrecht (2003) 13. Korotkikh, V., Korotkikh, G., Bond, D.: On optimality condition of complex systems: computational evidence. arXiv:cs.CC/0504092.

Integration Principle as the Master Equation of the Dynamics: : :

41

14. Korotkikh, V., Korotkikh, G.: On a new type of information processing for efficient management of complex systems. InterJournal of Complex Systems, 2055 (2008) Available via arXiv/0710.3961 15. Korotkikh, V., Korotkikh, G.: On principles in engineering of distributed computing systems. Soft Computing. 12(2), 201–206 (2008) 16. Korotkikh, V., Korotkikh, G.: Complexity of a system as a key to its optimization. In: Pardalos, P., Grundel, D., Murphey, R., Prokopyev, O. (eds.) Cooperative Networks: Control and Optimization, pp. 171–186. Edward Elgar Publishing, Cheltenham (2008) 17. Korotkikh, V.: Multicriteria analysis in problem solving and structural complexity. In: Pardalos, P., Siskos, Y., Zopounidis, C. (eds.) Advances in Multicriteria Analysis, pp. 81–90. Kluwer Academic Publishers, Dordrecht (1995) 18. Gisin, N.: Can relativity be considered complete? From Newtonian nonlocality to quantum nonlocality and beyond. arXiv:quant-ph/0512168 19. Orus, R., Latorre, J., Martin-Delgado, M. A.: Systematic analysis of majorization in quantum algorithms. arXiv:quant-ph/0212094 20. Maity, K., Lakshminarayan, A.: Quantum chaos in the spectrum of operators used in Shor’s algorithm. arXiv:quant-ph/0604111 21. Korotkikh, V., Korotkikh, G.: On principles of developing and functioning of the cyber infrastructure for the Australian coal industry. Coal Supply Chain Cyber Infrastructure Workshop, Babcock & Brown Infrastructure, Level 25, Waterfront Place, Brisbane, August 15 (2006) 22. Korotkikh, G., Korotkikh, V.: From space and time to a deeper reality as a possible way to solve global problems. In: Sayama, H., Minai, A.A., Braha, D., Bar-Yam, Y. (eds.) Unifying Themes in Complex Systems, vol. VIII, pp. 1565–1574. New England Complex Systems Institute Series on Complexity, NECSI Knowledge Press (2011) Available via arXiv:1105.0505v1

On the Optimization of Information Workflow ˜ Rakesh Nagi, Moises Sudit, Michael J. Hirsch, H´ector Ortiz-Pena, and Adam Stotz

Abstract Workflow management systems allow for visibility, control, and automation of some of the business processes. Recently, nonbusiness domains have taken an interest in the management of workflows and the optimal assignment and scheduling of workflow tasks to users across a network. This research aims at developing a rigorous mathematical programming formulation of the workflow optimization problem. The resulting formulation is nonlinear, but a linearized version is produced. In addition, two heuristics (a decoupled heuristic and a greedy randomized adaptive search procedure (GRASP) heuristic) are developed to find solutions quicker than the original formulation. Computational experiments are presented showing that the GRASP approach performs no worse than the other two approaches, finding solutions in a fraction of the time. Keywords Workflow optimization • Decomposition • Nonlinear mathematical program

heuristic • GRASP

M.J. Hirsch () Raytheon Company, Intelligence and Information Systems, 300 Sentinel Drive, Annapolis Junction, MD 20701, USA e-mail: [email protected] H. Ortiz-Pe˜na • M. Sudit • A. Stotz CUBRC, 4455 Genesee Street, Buffalo, NY 14225, USA e-mail: [email protected]; [email protected]; [email protected] R. Nagi Department of Industrial and Systems Engineering, University at Buffalo, 438 Bell Hall, Buffalo, NY 14260, USA e-mail: [email protected] A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 3, © Springer Science+Business Media New York 2012

43

44

M.J. Hirsch et al.

1 Introduction In general, a workflow management system (WfMS) allows for control and assessment of the tasks (or activities) associated with a business process, defined in a workflow. A workflow is a model of a process, consisting of a set of tasks, users, roles, and a control flow that captures the interdependencies among tasks. The control flow can be defined explicitly by indicating precedence relationships among the tasks, or indirectly by the information requirements (e.g., documents, messages) in order to perform the tasks. WfMS has emerged as an important technology for automating business processes, drawing increasing attention from researchers. Ludascher et al. [9] provide a thorough introduction to workflows and present a few scientific workflow examples. Georgakopoulos et al. [7] discussed three different types of workflows: ad hoc, administrative, and production. Ad hoc workflows perform standard office processes, where there is no set pattern for information flow across the workflow. Administrative workflows involve repetitive and predictable business processes, such as loan applications or insurance claims. Production workflows, on the other hand, typically encompass a complex information process involving access to multiple information systems. The ordering and coordination of tasks in such workflows can be automated. However, automation of production workflows is complicated due to: (a) information process complexity, and (b) accesses to multiple information systems to perform work and retrieve data for making decisions (to contrast, administrative workflows rely on humans for most of the decisions and work performed). WfMSs that support production workflow must provide facilities to define task dependencies and control task execution with little or no human interaction. Production WfMSs are often mission critical in nature and must deal with the integration and interoperability of heterogeneous, autonomous, and/or distributed information systems. There are many different items to consider with WfMS. One key aspect is the optimal assignment and scheduling of the tasks in a workflow. Joshi [8] discussed the problem of workflow scheduling aiming to achieve cost reduction through an optimal assignment and scheduling of workflows. Each workflow was characterized by a unique due date and tardiness penalty. The problem is formulated as a mixed integer linear program (MILP). The model assumed that the dependencies and precedence relationships among the workflows are deterministic and unique. Tasks are not preemptive and the processing times and due dates are also deterministic and known. Users can assume several roles but can perform only one task at a time. The total cost component which the model tries to minimize consists of two elements: processing cost and tardiness penalty cost. Processing cost refers to the price charged by the user to perform the assigned tasks; tardiness penalty cost refers to the product of a unit tardiness penalty for the workflow and the time period by which it is late (with respect to its assigned due date). A branch and price approach was proposed to solve the problem. Moreover, an acyclic graph heuristic was developed to solve the sub-problems of this approach. The proposed algorithm was used to solve static and reactive situations. Reactive scheduling (or rescheduling) is

On the Optimization of Information Workflow

45

the process of revising a given schedule due to unexpected events. Events considered by the author included: change in priority of a workflow, change in processing time of tasks, and the addition of new workflows. The results of a computational study indicate the benefits of using reactive strategies when the magnitude and frequency of changes increase. Nukala [10] described the software implementation details (e.g., architecture, data files manipulation, etc.) while developing the schedule deployer and POOL (Process Oriented OpenWFE Lisp) updater (SDPU) application which uses the algorithm described in Joshi [8] as the workflow scheduler. Xiao et al. [15] proposed an optimization method of workflow pre-scheduling based on a nested genetic algorithm (NGA). By pre-scheduling, the authors refer to the scheduling of all tasks when the workflow is initialized (as opposed to, e.g., reactive workflow scheduling in which tasks might be scheduled even when the workflow is active and some tasks have already been completed). The problem can then be described as finding the optimal precedence and resource allocation such that the finish time of the last task is minimized. NGA uses nested layers to optimize several variables. For this approach, two variables were considered: an inner layer referring to the allocation of resources and an outer layer referring to the execution sequence of tasks. The solutions found by the NGA algorithm were better than the solutions found by a dynamic method consisting of a greedy heuristic that assigned the resource able to complete the task fastest to execute the task. Dewan et al. [2] presented a mathematical model to optimally consolidate tasks to reduce the overall cycle time in a business information process. Consolidation of tasks may reduce or eliminate cost losses and delays due to the required communication and information hand-off between tasks. On the other hand, consolidation represents loss of specialization, which may result in larger process time. Using this formulation, the authors analytically and numerically present the impact of delay costs, hand-off, and loss of specialization on the benefits of tasks consolidation. In Zhang et al. [17], the authors considered quality-of service (QoS) optimization, by minimizing the number of machines, subject to customer response time and throughput requirements. They propose an efficient algorithm that decomposes the composite-service level response time requirements into atomic-service level response time requirements that are proportional to the CPU consumption of the atomic services. Binary search was incorporated in their algorithm to identify the maximum throughput that can be supported by a set of machines. A greedy algorithm was used for the deployment of services across machines. Zhang et al. [18] presented research on grid workflow and dynamic scheduling. The “grid” refers to a new computing infrastructure consisting of large-scale resource sharing and distributed system integration. Grid workflow is similar to traditional workflow but most of grid applications are, however, high performance computing and data intensive requiring efficient, adaptive use of available grid resources. The scheduling of a workflow engine has two types: static scheduling and dynamic scheduling. The static scheduling allocates needed resources according to the workflow process description. The dynamic scheduling also allocates resources according to the process description but takes into account the conditions of grid resources. Although

46

M.J. Hirsch et al.

the authors indicated that the resources can be scheduled according to QoS and performance, the algorithm only considers the latter. The grid workflow modeling on this research is based on petri nets. Xianwen et al. [14] presented a dependent task static scheduling problem considering the dynamics and heterogeneity of the grid resources. A reduced taskresource assignment graph (RT-RAG)-based scheduling model and an immune generic algorithm (IGA) scheduling algorithm were proposed. The RT-RAG is expressed as a 4-tuple < V; E; W V; WE > in which V represents the set of nodes, E represents the set of precedence constraints, W V represents the node weight, and WE represents the edges weight. The nodes express a mapping from a task to a resource, the node weights express communication data, and the edge weights include the computation cost and the bandwidth constraints. The RT-RAG is derived from the task graph (including all tasks) by applying a “reduction rule” which removes all tasks that are finished. The proposed IGA performed better than the adaptive heterogeneous earliest finish time (HEFT)-based Rescheduling (AHEFT) algorithm [16] and the dynamic scheduling algorithm Min-Max [11] in the experiments conducted by the authors. It was indicated in the paper that the initial parameters of IGA were critical to the performance of the algorithm. Tao et al. [13] proposed and evaluated the performance of the rotary hybrid discrete particle swarm optimization (RHDPSO) algorithm for the multi-QoS constrained grid workflow scheduling problem. This grid system selects services from candidate services according to the parameters set by a user to complete the grid scheduling. QoS was defined as a six-tuple (Time, Cost, Reliability, Availability, Reputation, Security) to characterize the service quality. Time measures the speed of a service response. This is expressed as the sum of the service execution time and service communication time. Cost describes the total cost of service execution. Reliability indicates the probability of the service being executed successfully. Availability measures the ability of the service to finish in the prescriptive time. The value of availability is computed using the ratio of service execution time and the prescriptive time. Reputation is a measure of service “trustworthiness” and it is expressed as the average ranking given by users. Security is a measure indicating the possibility of the service being attacked or damaged. The higher this value, the lower this possibility. The advantage of the RHDPSO algorithm over a discrete particle swarm optimization algorithm is its speed of convergence and the ability to obtain faster and feasible schedules. In our research, we are concerned with information workflows. Information is generated by some tasks (i.e., produced as output) and consumed by other tasks (i.e., needed as input). There are multiple information workflows, with multiple tasks, that need to be assigned to users. Users can take on certain roles, and tasks can only be performed by users with certain roles. The tasks themselves can have precedence relationships. Overall, the goal is to minimize the time at which the last task gets completed. We formulated the assignment and scheduling of tasks to users, and the information flow amongst the users as a mixed-integer nonlinear program (MINLP). The flow of information considered the required information by certain

On the Optimization of Information Workflow

47

tasks (as input), the information produced by tasks (as output), and precedence relationships between tasks. In addition to linearizing the MINLP, two heuristics were developed; a decomposition heuristic and the construction phase of a greedy randomized adaptive search procedure (GRASP). The rest of this paper is organized as follows: Sect. 2 describes the MINLP formulation for the information workflow problem, as well as the linearization. In Sect. 3, a detailed description of the two heuristic approaches considered to solve the MILNP is provided. A computational study and analysis is presented in Sect. 4. Finally, conclusions and future research are discussed in Sect. 5.

2 Mathematical Formulations 2.1 Problem Definition The overall problem addressed here is to assign tasks occurring on multiple information workflows to users, and flow information amongst the users, from tasks that produce information as output to tasks that require the information as input. Each task can only be assigned to a user if the task roles and the user roles overlap. Users have processing times to accomplish tasks. There are precedence relationships between the tasks (e.g., Task k must be completed before Task m can start). In addition, tasks might require certain information as input before they can begin, and tasks might generate information as output when they are completed. If a task needs a certain piece of information as input (e.g., ˛), there needs to be an assignment of the transference of ˛ from a user assigned a task producing ˛ as output to the user assigned the task requiring ˛ as input. We are assuming in this research that the transference of information from one user to another is instantaneous, i.e., that there is infinite bandwidth. In the sequel we will consider the case of finite uplink and downlink bandwidth. We note that we use the term “user” rather loosely. A user could be an human performing a task, as well as an automated system performing a task. We also make the assumption that two tasks assigned to one user cannot be accomplished simultaneously, i.e., once a user starts one task, that task needs to be completed before the user can move on to the next task it is assigned. Figure 1 presents an example scenario. In this scenario, there are two workflows. The goal is to assign the tasks on the workflows to users, schedule the tasks assigned to each user, and determine the appropriate information transfers that need to take place among the users, and when those information transformations need to be performed. In this figure, the tasks are color-coded by the user assignments, and the information flows detailed. In this example scenario, User 1 is first assigned to perform Task 1 (on workflow 1). When Task 1 is completed, and User 1 receives information from User 3, then User 1 can begin its next task, Task 3 (on workflow 2). Once complete with Task 3, User 1 can begin Task 8 (on workflow 2).

48

M.J. Hirsch et al.

User 2

User 3

Task10

Task4 User 1

Information b

Task1 User 3

Task6

User 2

Task9 Workflow 1

Information a

Information w Information m

User 3

Task2

User 1

Task3

User 3

Task5 User 4

Task7

User 2

Task11

User 1

Task8 Workflow 2 Fig. 1 Multiple information workflows, with users assigned to tasks, and information flow defined across users

2.2 Parameters This section introduces the parameters incorporated into the information workflow optimization formulation. For the mathematical formulation to follow, the parameters, decision variables, and constraints are defined for all i 2 f1; : : : ; T g, j 2 f1; : : : ; Pg, q 2 f1; : : : ; Qg, and n 2 f1; : : : ; N g. (N.B.: It is possible for N to be 0; the case when there is no information artifacts produced as possible outputs of some tasks and/or inputs of other tasks. In that case, all constraints and decision variables that use n as an index drop out of the nonlinear and linearized formulations.) T 2 ZC defines the number of activities (indexed by i ). P 2 ZC defines the number of users (indexed by j ). ij 2 RC [ f0g defines the processing time of activity i by user j . Q 2 ZC defines the number of possible roles (indexed by q). N 2 ZC [ f0g defines the number of possible inputs / outputs of all activities on all workflows—called information artifacts (indexed by n).

On the Optimization of Information Workflow

49

( Rj is binary vector of length Q, where Rj q D

1 if user j can perform role q

. 0 o.w. 8 ˆ 1), and as the parameter value decreases, it becomes non-convex. For D 1 it approximates the hinge loss function (hinge loss function is a typical function often used in SVMs). However, for smaller values of kernel width the function almost approximates the 0–1 loss function, which is mostly an unexplored territory for typical classification problems. In fact, any value of kernel width apart from D 2 or 1 has not been studied for other loss functions. This peculiar property of correntropic function can be harmoniously used with the concept of convolution smoothing for finding global optimal solutions. Moreover, with a fixed lower value of kernel width, suitable global optimization algorithms (heuristics like simulated annealing) can be used to find the global optimal solution. In the following sections, elementary ideas about different optimization algorithms that can be used with the correntropic loss function are discussed.

2.3 Convolution Smoothing A convolution smoothing (CS) approach2 forms the basis for one of the proposed methods of correntropic risk minimization. The main idea of CS approach is sequential learning, where the algorithm starts from a high kernel width correntropic loss function and smoothly moves towards a low kernel width correntropic loss function (approximating original loss function). The suitability of this approach can be seen in [29], where the authors used a two-step approach for finding the global optimal solution. The current proposed method is a generalization of the two-step approach. Before discussing the proposed method, consider the following basic framework of CS. A general unconstrained optimization problem is defined as minimizeW g.u/

(13a)

u 2 Rn ;

(13b)

subject toW

2

A general approach for solving non-convex problems via convolution smoothing was proposed by Styblinski and Tang [30] in 1990.

90

M.N. Syed et al.

a

3.5 σ=2 3

2.5 σ=1 F σe

2

1.5 σ = 0.5 1

0-1 Loss

0.5

0 −1

−0.8

−0.6

−0.4

−0.2 0 0.2 margin α →

0.4

0.6

0.8

1

−0.4

−0.2

0.4

0.6

0.8

1

b 1 0-1 Loss 0.9 0.8 0.7

σ = 0.5 σ=1 σ=2

F σe

0.6 0.5 0.4 0.3 0.2 0.1 0 −1

−0.8

−0.6

0 0.2 error ε →

Fig. 1 Correntropic function and 0–1 loss function

Correntropy in Data Classification

91

where g W Rn 7! R. The complexity of solving such problems depends upon the nature of function g. If g is convex in nature, then a simple gradient descent method will lead to the global optimal solution. Whereas, if g is non-convex, then gradient descent algorithm will behave poorly, and converges to a local optimal solution (or in the worst case converges to a stationary point). CS is a heuristic-based global optimization method to solve problems of type (13) when g is non-convex. This is a specialized stochastic approximation method introduced in [24]. Usage of convolution in solving convex optimization problems was first proposed in [3]. Later, as an extension, a generalized method for solving non-convex unconstrained problems is proposed in [26]. The main motivation behind CS is that the global optimal solution of a multi-extremal function g can be obtained by the information of a local optimal solution of its smoothed function. It is assumed that the function g is a convoluted function of a convex function g0 and other non-convex functions gi 8 D 1; : : : ; n. The other non-convex functions can be seen as noise added to the convex function g0 . In practice g0 is intangible, i.e., it is impractical to obtain a deconvolution of g into gi ’s, such that argminu fg.u/g D argminu fg0 .u/g. In order to overcome this difficulty, a smoothed approximation function b g is used. This smoothed function has the following main property: b g .u; / ! g.u/

as ! 0;

(14)

where is the smoothing parameter. For higher values of , the function is highly smooth (nearly convex), and as the value of tends towards zero, the function takes the shape of original non-convex function g. Such smoothed function can be defined as Z 1 b h..u v/; / g.v/ dv; (15) b g .u; / D 1

where b h.v; / is a kernel function, with the following properties: • • •

b h.v; / ! ı.v/; as ! 0; where ı.v/ is Dirac’s delta function. b h.v; / is a probability distribution function. b h.v; / is a piecewise differentiable function with respect to u. Moreover, the smoothed gradient of b g .u; / can be expressed as Z

1

rb g .u; / D

rb h.v; / g.u v/ dv:

(16)

1

Equation (16) highlights a very important aspect of CS, it states that information of rg.v/ is not required for obtaining the smoothed gradient. This is one of the crucial aspects of smoothed gradient that can be easily extended for non-smooth optimization problems, where rg.v/ does not usually exist.

92

M.N. Syed et al.

Furthermore, the objective of CS is to find the global optimal solution of function g. However, based on the level of smoothness, a local optimal solution of the smoothed function may not coincide with the global optimal solution of the original function. Therefore, a series of sequential optimizations are required with different level of smoothness. Usually, at first, a high value of is set, and an optimal solution u? is obtained. Taking u? as the starting point, the value of is reduced and a new optimal value in the neighborhood of u? is obtained. This procedure is repeated until the value of is reduced to zero. The idea behind these sequential optimizations is to end up in a neighborhood of u? as ! 0, i.e., u? ! u?

as ! 0;

(17)

where u? D argminfg.u/g. The crucial part in the CS approach is the decrement of the smoothing parameter. Different algorithms can be devised to decrement the smoothing parameter. In [30] a heuristic method (similar to simulated annealing) is proposed to decrease the smoothing parameter. Apparently, the main difficulty of using the CS method to any optimization problem is defining a smoothed function with the property given by (14). However, the CS can be used efficiently with the proposed correntropic loss function, as the correntropic loss function can be seen as a generalized smoothed function for the true loss function (see Fig. 1). The kernel width of correntropic loss function can be visualized as the smoothing parameter. Therefore, the CS method is applicable in solving the classification problem, when suitable kernel width is unknown a priori (a practical situation). On the other hand, if appropriate value of kernel is width known a priori (maybe an impractical assumption, but quiet possible), then other efficient methods may be developed. If the known value of kernel width in the correntropic loss function results into a convex function, then any gradient descent based method can be used. However, when the resulting correntropic loss function is non-convex, then global optimization approaches should be used. Specifically, for such cases (when the correntropic loss function results in a non-convex function) the use of simulated annealing is proposed. In the following section, the basic description of simulated annealing is presented.

2.4 Simulated Annealing Simulated annealing (SA) is a meta-heuristic method which is employed to find a good solution to an optimization problem. This method stems from thermal annealing which aims to obtain a perfect crystalline structure (lowest energy state possible) by a slow temperature reduction. Metropolis et al. in 1953 simulated this processes of material cooling [6], Kirkpatrick et al. applied the simulation method for solving optimization problems [13, 20].

Correntropy in Data Classification

93

Simulated annealing can be viewed as an upgraded version of greedy neighborhood search. In neighborhood search method, a neighborhood structure is defined in the solution space, and the neighborhood of a current solution is searched for a better solution. The main disadvantage of this type of search is its tendency to converge to a local optimal solution. SA tackles this drawback by using concepts from Hill-climbing methods [17]. In SA, any neighborhood solution of the current solution is evaluated and accepted with a probability. If the new solution is better than the current solution, then it will replace the current solution with probability 1. Whereas, if the new solution is worse than the current solution, then the acceptance probability depends upon the control parameters (temperature and change in energy). During the early iterations of the algorithm, temperature is kept high, and this results in a high probability of accepting worse new solutions. After a predetermined number of iterations, the temperature is reduced strategically, and thus the probability of accepting a new worse solution is reduced. These iterations will continue until any of the termination criteria is met. The use of high temperature at the earlier iterations (low temperature at the later iterations) can be viewed as exploration (exploitation, respectively) of the feasible solution space. As each new solution is accepted with a probability it is also known as stochastic method. A complete treatment of SA and its applications is carried out in [23]. Neighborhood selection strategies are discussed in [1]. Convergence criteria of SA are presented in [14]. In this work, SA will be used to train the correntropic loss function when the information of kernel width is known a priori. Although the assumption of known kernel width seems implausible, any known information of an unknown variable will increase the efficiency of solving an optimization problem. Moreover, a comprehensive knowledge of data may provide the appropriate kernel width that can be used in the loss function. Nevertheless, when kernel width in unknown, a grid search can be performed on the kernel width space to obtain appropriate kernel width that maximizes the classification accuracy (this is a typical approach while using kernel-based soft margin SVMs, which generally involves grid search over a two dimensional parameter space). b ) is addressed. In the current So far, no discussion about the function class ( work, a nonparametric function class namely artificial neural networks, and a parametric function class namely support vector machines is considered. In the following section, an introductory review of artificial neural networks is presented.

2.5 Artificial Neural Networks Curiosity of studying the human brain led to the development of ANNs. Henceforth, ANNs are the mathematical models that share some of the properties of brain functions, such as nonlinearity, adaptability, and distributed computations. The first mathematical model that depicted a working ANN used the perceptron, proposed by McCulloch and Pitts [15]. The actual adaptable perceptron model is credited to

94

M.N. Syed et al.

Fig. 2 Perceptron

Rosenblatt [25]. The perceptron is a simple single layer neuron model, which uses a learning rule similar to gradient descent. However, the simplicity of this model (single layer) limits its applicability to model complex practical problems; thereby, it was an object of censure in [19]. However, a question which instigated the use of multilayer neural networks was kindled in [19]. After a couple of decades of research, neural network research exploded with impressive success. Furthermore, multilayered feedforward neural networks are rigorously established as a function class of universal approximators [11]. In addition to that, different models of ANNs were proposed to solve combinatorial optimization problems. Furthermore, the convergence conditions for the ANNs optimization models have been extensively analyzed [31]. Processing elements (PEs) are the primary elements of any ANN. The state of PE can take any real value between the interval Œ0; 1 (some authors prefer to use the values between [1,1]; however, both definitions are interchangeable and have the same convergence behavior). The main characteristic of a PE is to do function embedding. In order to understand this phenomenon, consider a single PE ANN model (the perceptron model) with n inputs and Pone output, shown in Fig. 2. The total information incident on the PE is niD1 wi xi . PE embeds this information into a transfer function , and sends the output to the following layer. Since there is a single layer in the example, the output from the PE is considered as the final output. Moreover, if we define as ! ( P n X 1 if niD1 wi xi C b 0; wi xi C b D (18) 0 otherwise; i D1 where b is the threshold level of the PE, then the single PE perceptron can be used for binary classification, given the data is linearly separable. The difference

Correntropy in Data Classification

95

between this simple perceptron method of classification, and support vector-based classification is that the perceptron finds a plane that linearly separates the data; however, support vector finds the plane with maximum margin. This does not indicate superiority of one method over the other method since a single PE is considered. In fact, this shows the capability of a single PE; however, a single PE is incapable to process complex information that is required for most practical problems. Therefore, multiple PEs in multiple layers are used as universal classifiers. The PEs interact with each other via links to share the available information. The intensity and sense of interactions between any two connecting PEs is represented by weight (or synaptic weight, the term synaptic is related to the nervous system, and is used in ANNs to indicate the weight between any two PEs) on the links. Usually, PEs in the .r 1/th layer send information to the r th layer using the following feedforward rule: 0 1 X yi D i @ wj i yj Ui A ; (19) j 2.r1/

where PE i belongs to the r th layer, and any PE j belongs to the .r 1/th layer. yi represents the state of the i th PE, wj i represents weight between the j th PE and i th PE, and Ui represents threshold level of the i th PE. Function i ./ is the transfer function for the i th PE. Once the PEs in the final layer are updated, the error from the actual output is calculated using a loss function (this is the part where correntropic loss function will be injected). The error or loss calculation marks the end of feed forward phase of ANNs. Based on the error information, back-propagation phase of ANNs starts. In this phase, the error information is utilized to update the weights, using the following rules: wj k D wj k C ık yj ;

(20)

where @F ."/ 0 .netk /; (21) @"n P where is the learning step size, netk D j 2.r1/ wj i yj Uk , and F ."/ is the error function (or loss function). For the output layer, the weights are computed as ık D

@F ."/ 0 .netk /; @" D .y y0 / 0 .netk /;

ık D ı0 D

(22)

and the deltas of the previous layers are updated as ık D ıh D 0 .netk /

N0 X oD1

who ıo :

(23)

96

M.N. Syed et al.

In the proposed approaches, ANN is trained in order to minimize the correntropic loss function. In total, two different approaches to train ANN are proposed. In one approach, ANN will be trained using the CS algorithm. Whereas in the other proposed approach, ANN will be trained using the SA algorithm. In order to validate our results, we will not only compare the proposed approaches with conventional ANN training methods, but also compare them with the support vector machines based classification method. In the following section, a review of support vector machines is presented.

2.6 Support Vector Machines A support vector machine (SVM) is a popular supervised learning method [5, 7]. It has been developed for binary classification problems, but can be extended to multiclass classification problems [9,33,36] and it has been applied in many areas of engineering and biomedicine [10,12,21,32,37]. In general supervised classification algorithms provide a classification rule able to decide the class of an unknown sample. In particular the goal of SVMs training phase is to find a hyperplane that “optimally” separates the data samples that belong to a class. More precisely SVM is a particular case of hyperplane separation. The basic idea of SVM is to separate two classes (say A and B) by a hyperplane defined as f .x/ D wt x C b;

(24)

such that f .a/ < 0 when a 2 A, and f .b/ > 0 when b 2 B. However, there could be infinitely many possible ways to select w. The goal of SVM is to choose a best w according to a criterion (usually the one that maximizes the margin), so that the risk of misclassifying a new unlabeled data point is minimum. A best separating hyperplane for unknown data will be the one, that is sufficiently far from both the classes (it is the basic notion of SRM), i.e., a hyperplane which is in the middle of the following two parallel hyperplanes (support hyperplanes) can be used as a separating hyperplane: wt x C b D c; t

w x C b D c:

(25) (26)

Since, w; b, and c are all parameters, a suitable normalization will lead to wt x C b D 1;

(27)

wt x C b D 1:

(28)

Moreover, the distance between the supporting hyperplanes (27) and (28) is given by 2 : (29)

D jjwjj

Correntropy in Data Classification

97

In order to obtain the best separating hyperplane, the following optimization problem is solved: maximizeW 2 jjwjj

(30a)

yi .wt xi C b/ 1 0 8i:

(30b)

subject toW

The objective given in (30a) is replaced by minimizing jjwjj2 =2. Usually, the solution to problem (30) is obtained by solving its dual. In order to obtain the dual, consider the Lagrangian of (30), given as N X 1 2 ui yi .wt xi C b/ 1 ; L.w; b; u/ D jjwjj 2 i D1

(31)

where ui 0 8 i . Now, observe that problem (30) is convex. Therefore, the strong duality holds, and the following equation is valid: min max L.w; b; u/ D max min L.w; b; u/:

.w;b/

u

u

.w;b/

(32)

Moreover, from the saddle point theory [4], the following hold: wD

N X

ui yi xi ;

(33)

i D1 N X

ui yi D 0:

(34)

i D1

Therefore, using (33) and (34), the dual of (30) is given as maximizeW N X i D1

ui

N 1 X ui uj yi yj xi t xj 2 i;j D1

(35a)

subject toW N X

ui yi D 0;

(35b)

i D1

ui 0 8i:

(35c)

98

M.N. Syed et al.

Thus, solving (35) results in obtaining support vectors, which in turn leads to the optimal hyperplane. This phase of SVM is called as training phase. The testing phase is simple and can be stated as ( 1; test 2 A if f .xtest / < 0, ytest D (36) C1; test 2 B if f .xtest / > 0. The above method works very well when the data is linearly separable. However, most of the practical problems are not linearly separable. In order to extend the usability of SVMs, soft margins and kernel transformation are incorporated in the basic linear formulation. When considering soft margin, (30a) is modified as yi .wt xi C b/ 1 C si 0

8i;

(37)

where si 0 are slack variables. The primal formulation is then updated as minimizeW N X 1 jjwjj2 C c si 2 i D1

(38a)

subject toW yi .wt xi C b/ 1 C si 0

8i;

si 0 8i:

(38b) (38c)

Similar to the linear SVM, the Lagrangian of formulation (38) is given by L.w; b; u; v/ D

N N X X 1 si ui yi .wt xi C b/ 1 vt s; jjwjj2 C c 2 i D1 i D1

(39)

where ui ; vi 0 8 i . Correspondingly, using the theory of saddle point and strong duality, the soft margin SVM dual is defined as maximizeW N X

ui

i D1

N 1 X ui uj yi yj xi t xj 2 i;j D1

(40a)

subject toW N X

ui yi D 0;

(40b)

i D1

ui c

8i;

(40c)

ui 0 8i:

(40d)

Correntropy in Data Classification

99

Furthermore, the dot product ”xi t xj ” in (40a) is exploited to overcome the nonlinearity, i.e., by using kernel transformations into a higher dimensional space. Thus, the soft margin kernel SVM has the following dual formulation: maximizeW N X

N 1 X ui ui uj yi yj K.xi ; xj / 2 i;j D1 i D1

(41a)

subject toW N X

ui yi D 0;

(41b)

i D1

ui c

8i;

(41c)

ui 0

8i;

(41d)

where K.:; :/ is any symmetric kernel. In this chapter, a Gaussian kernel is used, which is defined as 2

K.xi ; xj / D e jjxi xj jj ;

(42)

where > 0. Therefore, in order to classify the data, two parameters (c; ) should be given a priori. The information about the parameters is obtained from the knowledge and structure of the input data. However, this information is intangible for practical problems. Thus, an exhaustive logarithmic grid search is conducted over the parameter space to find their suitable values. It is worthwhile to mention that assuming c and as variables for the kernel SVM, and letting the kernel SVM try to obtain the optimal values of c and , makes the classification problem (41) intractable. Once the parameter values are obtained from the grid search, the kernel SVM is trained to obtain the support vectors. Usually the training phase of the kernel SVM is performed in combination with a re-sampling method called cross validation. During cross validation the existing data set is partitioned in two parts (training and testing). The model is built based on the training data, and its performance is evaluated using the testing data. In [28], a general method to select data for training SVM is discussed. Different combinations of training and testing sets are used to calculate average accuracy. This process is mainly followed in order to avoid manipulation of classification accuracy results due to a particular choice of the training and testing datasets. Finally the classification accuracy reported is the average classification accuracy for all the cross validation iterations. There are several cross validation methods available to built the training and testing sets. Next, three most common methods of cross validation are described: • k-Fold cross validation (kCV): In this method, the data set is partitioned in k equally sized groups of samples (folds). In every cross validation iteration k 1 folds are used for the training and 1 fold is used for the testing. In the literature usually k takes a value from 1; : : : ; 10.

100

M.N. Syed et al.

• Leave one out cross validation (LOOCV): In this method, each sample represents one fold. Particularly, this method is used when the number of samples are small, or when the goal of classification is to detect outliers (samples with particular properties that do not resemble the other samples of their class). • Repeated random subsampling cross validation (RRSCV): In this method, the data set is partitioned into two random sets, namely training set and validation (or testing) set. In every cross validation, the training set is used to train the SVM and the testing (or validation) set to test the accuracy of SVM. This method is preferred, if there are large number of samples in the data. The advantage of this method (over k-fold cross validation) is that the proportion of the training set and number of iterations are independent. However, the main drawback of this method is, if few cross validations are performed, then some observations may never be selected in the training phase (or the testing phase), whereas others may be selected more than once in the training phase (or the testing phase, respectively). To overcome this difficulty, the kernel SVM is cross validated sufficiently large number of times, so that each sample is selected atleast once for training as well as testing the kernel SVM. These multiple cross validations also exhibits Monte Carlo variation (since the training and testing sets are chosen randomly). In this chapter, the RRSCV method is used to train the kernel SVM, the performance accuracy of the SVM is compared with the proposed approaches. In the next section, the different learning methodologies used to train ANNs and SVMs will be discussed.

3 Obtaining an Optimal Classification Rule Function The goal of any learning algorithm is to obtain the optimal rule f ? by solving the classification problem illustrated in formulation (6). Based on the type of loss function used in risk estimation, the type of information representation, and the type of optimization algorithm, different classification algorithms can be designed. In this section, five different classification methods, two of them are novel and the rest are conventional methods (used for comparison with novel methods), will be discussed. A summary of the classification methods is listed in Table 1. In the following part of this section, each of the listed methods will be explained.

3.1 Conventional Nonparametric Approaches A classical method of classification using ANN involves training a multilayer perceptron (MLP) using a back-propagation algorithm. Usually, a signmodal function is used as an activation function, and a quadratic loss function is used for error

Correntropy in Data Classification

101

Table 1 Notation and description of proposed (z) and existing (X) methods Notation Information representation Loss function Optimization algorithm AQGX Nonparametric (ANN) Quadratic Exact method— gradient descent Nonparametric (ANN) Initially quadratic, shifts ACG X Exact method— gradient to correntropy with descent fixed kernel width Nonparametric (ANN) Correntropy with varying Heuristic method— ACCz kernel width convolution smoothing Nonparametric (ANN) Correntropy with fixed Heuristic method— ACSz kernel width simulated annealing Parametric (SVM) Quadratic with Gaussian Exact method— quadratic SGQX kernel optimization

measurement. The ANN is trained using a back-propagation algorithm involving gradient descent method [16]. Before proceeding further to present the training algorithms, let us define the notations: wnjk : The weight between the k th and j th PEs at the nth iteration. yjn : Output of the j th PE at the nth iteration. P n n n th netkn D j wj k yj : Weighted sum of all outputs yj of the previous layer at n iteration. ./: Sigmoidal squashing function in each PE, defined as: .z/ D

1 e2 : 1 C e2

ykn D .netkn /: Output of k th PE of the current layer, at the nth iteration. y n 2 f˙1g: The true label (actual label) for the nth sample. In the following part of this section, two training algorithms (AQG and ACG) will be described. These algorithms differ in the type of loss function used to train ANNs.

3.1.1 Training ANN with Quadratic Loss Function Using Gradient Descent Training ANN with quadratic loss function using gradient descent (AQG) is the simplest and most widely known method of training ANN. A three layered ANN (input, hidden, and output layers) is trained using a back-propagation algorithm. Specifically, the generalized delta rule is used to update the weights of ANN, and the training equations are n n n wnC1 j k D wj k C ık yj ;

(43)

102

M.N. Syed et al.

where ıkn D

@MSE."/ 0 .netnk /; @"n

(44)

where is the learning step size, " D .y n y0n / is the error (or loss), and M SE."/ is the mean square error. For the output layer, the weights are computed as ıkn D ı0n D

@MSE."/ 0 .netnk /; @"n

D .y n y0n / 0 .netnk /;

(45)

The deltas of the previous layers are updated as ıkn D ıhn D 0 .netnk /

N0 X

wnho ıon :

(46)

oD1

3.1.2 Training ANN with Correntropic Loss Function Using Gradient Descent Training ANN with correntropic loss function using gradient descent (ACG) method is similar to AQG method, the only difference is the use of correntropic loss function instead of quadratic loss function. Furthermore, the kernel width of correntropic loss is fixed to a smaller value (in [29], a value of 0.5 is illustrated to perform well). Moreover, since the correntropic function is non-convex at that kernel width, the ANN is trained with a quadratic loss function for some initial epochs. After sufficient number of epochs (ACG1 ), the loss function is changed to correntropic loss function. Thus (ACG1 ) is a parameter of the algorithm. The reason for using quadratic loss function at the initial epochs is to prevent converging at a local minimum at early learning stages. Similar to AQG, the delta rule is used to update the weights of ANN, and the training equations are: n n n wnC1 j k D wj k C ık yj ;

(47)

where ıkn D

@F ."/ 0 .netnk /; @"n

(48)

where is the step length, and F ."/ is a general loss function, which can be either quadratic or correntropic function based on the current number of training epochs. For the output layer, the weights are computed as

Correntropy in Data Classification

ıkn D ı0n D D

8 0; i D 1; : : : ; N; (43)

j D1 N X

N ij 1; 0; j D 1; : : : ; M;

(44)

i D1

0 N ij 1; i D 1; : : : ; N; j D 1; : : : ; M:

(45)

Qi1 ,

By introducing the slack variable Ri such that Ri the problem (42) can be written as the semidefinite program given by (27) with constraints (28)–(31). t u

3.2 Approximate Solution that Approaches the Lower Bound By solving the semidefinite program (27), we can obtain the lower bound of the average cost (23) in the original sensor scheduling problem. The resulting fN ij g may take non-integer values within Œ0; 1 and Qi can be interpreted as the optimal long-term information matrix of object i corresponding to the maximum Fisher information that one would hope to obtain by utilizing the available sensing resources. Denote by ˘N D ŒN ij the sensor-to-object association matrix that solves the semidefinite program (27). We want to decompose ˘N to a linear combination of feasible sensor-to-object assignment matrices. Theorem 2. For any matrix ˘N that satisfies N X i D1

N ij 1; j D 1; : : : ; M; 0 N ij 1; i D 1; : : : ; N; j D 1; : : : ; M;

(46)

Sensor Scheduling for Space Object Tracking and Collision Alert

185

there exists some integer K such that ˘N D

K X

wk Pk

(47)

kD1

with wk > 0; k D 1; : : : ; K

(48)

and fPk g’s are feasible sensor-to-object assignment matrices. Proof. For M D 1, if N i1 ¤ 0, we can set wi D N i1 and Pi has a single nonzero entry indicating that object i will be observed. When M > 1, we need to expand the basis of fundamental object-to-sensor assignment matrices. A general way to handle this situation is by introducing dummy sensor and dummy object. With dummy sensors that have infinite noise power spectrum density, we can make ˘N an N N doubly sub-stochastic matrix where N M additional columns of zeros are added. Using Birkhoff theorem, we may decompose ˘N as a convex combination of permutation matrices [3]. Thus we have the feasible sensor-to-object assignment decomposition. In fact, there exists efficient algorithm that finds the weights fwk g in O.N 4:5 / for K D O.N 2 / coefficients [8]. t u Now we can design a sensor scheduling policy that periodically switches among the sensor-to-object assignment matrices fPk g to approximate the optimal solution to (23). Let ı be some duration of time. At time t D 0, the sensor-to-object assignment is based on P1 , i.e., we allow sensor j to observe object i only when p1;i;j D 1. Once the observations are made, each object will update its state estimate according to the Kalman–Bucy filter. At time t D w1 ı, we switch the sensor schedule according to P2 . At time t D .w1 C w2 /ı, we switch the sensor schedule according to P3 and so on. Note that the sensor schedule will go back to P1 after a period of ı. Theorem 3. Let Cı be the average cost associated with the periodic switching policy ı among the sensor-to-object assignment matrices fPk g. Then Cı Cl D o.ı/ as ı ! 0. Proof. Denote by ˙iı .t/ the estimation error covariance of object i under the periodic sensor scheduling policy ı . When the whole state estimator reaches to its steady state as t ! 1, ˙iı .t/ will converge to a periodic function ˙N iı .t/ with period ı. The matrix ˙N iı .t/ satisfies the periodic Riccati equation P ˙Niı D Ai ˙Niı C A0i ˙Niı C Wi ˙Niı .Hiı /0 Hiı ˙Niı

(49)

with initial condition ˙Niı .0/ D ˙i .0/ where Hiı D

M X j D1

1=2

Vij;ı Hij;ı

(50)

186

H. Chen et al.

is a piecewise constant value function with period ı [7]. Let ˙N iı be the average of ˙N iı .t/ Z 1 ı Nı ı N ˙ ./d (51) ˙i D ı 0 i and we can see that ˙N iı .t/ ˙N iı D o.ı/, 8t. As ı ! 0, ˙N iı converges to the unique solution to the algebraic Riccati equation [1] 0 Ai ˙N i C ˙N i A0i C Wi ˙N i @

M X

1 N ij Hij0 Vij1 Hij A ˙N i D 0;

(52)

j D1

since 1 lim T !1 T

Z

T 0

M N X X

ij ijı .t/dt

i D1 j D1

D

M N X X

ij N ij :

(53)

i D1 j D1

When N ij ’s are obtained by solving the semidefinite program (27), QN i D ˙N i1 also P 1 minimizes N i D1 Tr.Ci Qi / for all matrices Qi > 0 that satisfy Qi Ai C A0i Qi C Qi Wi Qi

M X

N ij Hij0 Vij1 Hij 0:

(54)

j D1

Thus the policy ı has the resulting fN ij ; QN i g with the average cost no greater than Cl C o.ı/ as ı ! 0. t u In summary, the optimal average cost C 2 ŒCl ; Cl C o.ı/. Unfortunately, the M sensors have to switch among K different sensor-to-object assignment solutions with appropriate coverage intervals within a short period ı in order to approach the lower bound Cl . The analysis is based on linear dynamic state and measurement equation for each object. We will have to extend the results to the nonlinear estimation case.

3.3 Nonlinear Filter Design and Performance Bound 3.3.1 Recursive Linear Minimum Mean Square Error Filter When a space object has been detected, a tracking filter will predict the object’s state at any time in the future based on the available sensor measurements. Both the state dynamics and measurement equation are nonlinear resulting in the nonlinear state estimator for each object. Despite the abundant literature on nonlinear filter design [6, 11, 12, 14, 19, 25], we chose the following tracking filter

Sensor Scheduling for Space Object Tracking and Collision Alert

187

based on our earlier study [9]. With any given sensor schedule policy, we use the following notations for state estimation of any nonlinear dynamic system. Let x D Œx y z xP yP zP0 be the position and velocity of a space object in the earth-center earth-fixed coordinate system. Denote by xO k the state prediction from time tk1 to time tk based on the state estimate xO C at time tk1 with all measurements up to k1 tk1 . The prediction is made by numerically integrating the state equation given by xPO .t/ D f .Ox.t/; u.t//

(55)

without the process noise. The mean square error (MSE) of the state prediction is obtained by numerically integrating the following matrix equation: T x PP .t/ D F .Ox k /P .t/ C P .t/F .O k / C W .t/;

(56)

where F .Ox k / is the Jacobian matrix of the Keplerian orbital dynamics given by

I3 ; 033

033 F .x/ D F0 .x/ 2 6 F0 .x/ D 4

3x 2 r13 r5 3xy r5 3xz r5

3xy r5

3y 2 r5

3yz r5

1 r3

p r D x 2 C y 2 C z2

and evaluated at x D

xO k.

3z2 r5

(57) 3xz r5 3yz r5

3 7 5;

(58)

1 r3

(59)

The sensor measurement zk obtained at time tk is given by zk D h.xk / C vk ;

(60)

vk N .0; Vk /

(61)

where is the measurement noise, which is assumed independent of each other and independent to the initial state as well as process noise. Let Zk be the cumulative sensor measurements up to tk from a fixed sensor scheduling policy. The recursive linear minimum mean square error (LMMSE) filter applies the following update equation [1]: xO kjk D E xk jZk D xO kjk1 C Kk zQ kjk1 ; 0

Pkjk D Pkjk1 Kk Sk Kk ; where xO kjk1 D E xk jZk1 ; zO kjk1 D E zk jZk1 ;

(62) (63)

188

H. Chen et al.

xQ kjk1 D xk xO kjk1 ; zQ kjk1 D zk zO kjk1 ; i h Pkjk1 D E xQ kjk1 xQ 0kjk1 ; i h Sk D E zQ kjk1 zQ 0kjk1 ; Kk D CxQk zQk Sk1 ; i h CxQk Qzk D E xQ kjk1 zQ 0kjk1 : Note that E Œ becomes the conditional mean of the state for linear Gaussian dynamics and the above filtering equations become the celebrated Kalman filter [1]. For nonlinear dynamic system, (62) is optimal in the mean square error sense when the state estimate is constrained to be an affine function of the measurement. Given the state estimate xO k1jk1 and its error covariance Pk1jk1 at time tk1 , if the state prediction xO kjk1 , the corresponding error covariance Pkjk1 , the measurement prediction zO kjk1 , the corresponding error covariance Sk , and the crosscovariance E xQ kjk1 zQ 0kjk1 in (62) and (63) can be expressed as a function only through xO k1jk1 and Pk1jk1 , then the above formula is truly recursive. However, for general nonlinear system dynamics (1) and measurement equation (60) , we have xO kjk1 D E

Z

tk tk1

f .x.t/; w.t//dt C xk1 jZk1 ;

zO kjk1 D E h.xk ; vk /jZk1 :

(64) (65)

Both xO kjk1 and zO kjk1 will depend on the measurement history Zk1 and the corresponding moments in the LMMSE formula. In order to have a truly recursive filter, the required terms at time tk can be obtained approximately through xO k1jk1 and Pk1jk1 , i.e., ˚ xO kjk1 ; Pkjk1 Pred f ./; xO k1jk1 ; Pk1jk1 ; ˚ zO kjk1 ; Sk ; CxQk Qzk Pred h./; xO kjk1 ; Pkjk1 ; ˚ where Pred f ./; xO k1jk1 ; Pk1jk1 denotes that xO k1jk1 ; Pk1jk1 propagates through the nonlinear function f ./ to approximate E f ./jZk1 and the corresponding error covariance Pkjk1 . Similarly, Pred h./; xO kjk1 ; Pkjk1 predicts the measurement and the corresponding error covariance only through the approximated state prediction. This poses difficulties for the implementation of the recursive LMMSE filter due to insufficient information. The prediction of a random variable going through a nonlinear function, most often, cannot be completely determined using only the

Sensor Scheduling for Space Object Tracking and Collision Alert

189

first and second moments. Two remedies are often used: One is to approximate the system via unscented transform such that the the approximated ˚ prediction based on system can be carried out only through xO k1jk1 ; Pk1jk1 [20, 21]. Another is by approximating the density function with a set of particles and propagating those particles in the recursive Bayesian filtering framework, i.e., using a particle filter [13, 15, 17].

3.3.2 Posterior Cramer–Rao Lower Bound of the State Estimation Error When computing the dynamics of the state estimation error covariance, the sensor scheduler can use the performance bound without requiring to optimize the sensor-to-object assignment with respect to a particularly designed nonlinear state estimator. Denote by J.t/ the Fisher information matrix. Then the posterior Cramer–Rao lower bound (PCRLB) is given by [32] B.t/ D J.t/1 ;

(66)

which quantifies the ideal mean square error of any filtering algorithm, i.e., E .Ox.tk / x.tk //.Ox.tk / x.tk //T jZk B.tk /:

(67)

Assuming an additive white Gaussian process noise model, the Fisher information matrix satisfies the following differential equation: JP .t/ D J.t/F .x/ F .x/T J.t/ J.t/Q.t/J.t/

(68)

for tk1 t tk where F is the Jacobian matrix given by F .x/ D

@f .x/ : @x

(69)

When a measurement is obtained at time tk with additive Gaussian noise N .0; Rk /, the new Fisher information matrix is J.tkC / D J.tk / C Ex H.x/T Rk1 H.x/ ;

(70)

where H is the Jacobian matrix given by H.x/ D

@h.x/ : @x

(71)

The initial condition for the recursion is J.t0 / and the PCRLB can be obtained with respect to the true distribution of the state x.t/.

190

H. Chen et al.

In practice, the recursive LMMSE filter will be used to track each space object. The sensor manager will use the estimated state to compute the PCRLB and solve the semidefinite program (27) by replacing Qi with the Fisher information matrix of object i . The resulting periodic switching policy will have to be updated at the highest sensor revisit rate in order to approach the performance lower bound of the average cost. Alternatively, the sensor manager can apply information gain-based policy or index-based policy which require less computation within a fixed horizon. See [10] for specific sensor management implementations that utilize PCRLB for orbital object tracking.

4 Simulation Study 4.1 Scenario Description We consider a small-scale space object tracking and collision alert scenario where 30 LEO observers collaboratively track 3 LEO satellites (called red team) and monitor 5 LEO asset satellites (called blue team). The orbital trajectories are created with the same altitude similar to those real satellites from the NORAD catalog, but we can change the orbital trajectories to generate a collision event between an object from the red team and an object from the blue team. The associated tracking errors for each object in the red team were obtained based on the recursive linear minimum mean square error filter when sensors are assigned to objects according to some criterion based on the non-maneuvering motion. We assume that the orbital trajectories of LEO observers and blue team are known to red team. We also assume that each observer can update the sensing schedule no sooner than 50 s. The sensor schedule is based on the weights being proportional to the estimated collision probability over the impact time. The estimation of collision probability and impact time was presented in [26]. Red team may direct an unannounced object to perform intelligent maneuver that changes the inclination of its orbit. In particular, at time t D 1,000 s, object 1 performs a 1 s burn that produces a specific thrust which leads to a collision to object 3 in the blue team in 785 s. At time t D 1,523 s, object 2 performs a 1 s burn that produces a specific thrust which leads to a collision event to object 5 in the blue team in 524 s. Note that the maneuver onset time of object 2 is chosen to have the Earth blockage of the closest 3 LEO observers for more than 200 s. The maneuver is also lethal because of the collision path to the closest asset satellite in less than 9 min. Within 1,000 s and 2,000 s, object 3 performs a 1 s burn with random maneuver onset time that does not lead to a collision. The goal of sensor selection is to improve the tracking accuracy and declare the collision event as early as possible with false alarm below a desirable rate. Each observer has range, bearing, elevation, and range rate measurements with standard deviations 100 m, 10 mrad, 10 mrad, and 2 m/s, respectively. We applied the generalized Page’s test (GPT) for maneuver

Sensor Scheduling for Space Object Tracking and Collision Alert Table 1 Comparison of tracking accuracy and maneuver detection delay

Object (i) Average delay (s) (i) Average peak position error (km) (i) Average peak velocity error (km/s) (ii) Average delay (s) (ii) Average peak position error (km) (ii) Average peak velocity error (km/s) (iii) Average delay (s) (iii) Average peak position error (km) (iii) Average peak velocity error (km/s)

191

1 126 23.4 0.29 133 24.3 0.30 154 26.1 0.32

2 438 53.3 0.38 149 26.7 0.33 177 28.4 0.35

3 83 13.6 0.21 92 14.8 0.23 101 16.3 0.26

onset detection while the filter update of the state estimate does not use the range rate measurement [29]. The reason is that the nonlinear filter designed assuming non-maneuver target motion is sensitive to the model mismatch in the range rate when a space object maneuvers. The thresholds of the GPT were chosen to have the false alarm probability PFA D 1%.

4.2 Performance Comparison We studied three different sensor management (SM) configurations. (i) Information-based method: Sensors are selected with a uniform sampling interval of 50 s to maximize the total information gain. (ii) Periodic switching method: Sensing actions are scheduled to minimize the average cost by solving the semidefinite program (27). (iii) Greedy method: Sensing actions are obtained using Whittle’s index obtained assuming identical sensors. We ran 200 Monte Carlo simulations on the tracking and collision alert scenario for each SM configuration and compare both tracking and collision alert performance as opposed to the criteria used in the SM schemes. Table 1 shows the peak errors in position and velocity for each object in red team based on the centralized tracker using the measurements from three different SM schemes. The average detection delays for each object are also shown in Table 1. We can see that both the maneuver detection delay and average peak estimation error are larger using the conventional SM scheme (i) than the ones that optimize the cost over infinite horizon—(ii) and (iii)—for object 2. Note that object 2 has a lethal maneuver that requires more prompt sensing action to make early declaration of the collision event. However, the immediate information gain may not be as large as that from object 1. The covariance control based method will not make any correction to the sensing schedule either before the maneuver detection of object 2, which is a consequence of planning over a short time horizon. Interestingly, the performance degradation is quite mild for the index-based SM scheme compared with its near-optimal counterpart. Next, we compare the collision detection performance as well as the average time between the collision alert and its occurrence. We also compute the average number

192

H. Chen et al. Table 2 Performance comparison of collision detection probability and average early-warning duration Detection False alarm Average Configuration probability probability duration (s) Average scans (i) Object 1 (i) Object 2 (ii) Object 1 (ii) Object 2 (iii) Object 1 (iii) Object 2

0.88 0.31 0.93 0.85 0.88 0.78

0.04 0.05 0.04 0.03 0.04 0.04

514 138 518 346 502 328

2.8 2.5 2.6 2.2 2.5 2.4

of scans required to declare a collision event starting from the maneuver onset time. A collision alert will be declared when the closest encounter of two space objects is within 10 km with at least 99% probability based on the predicted orbital states. The false alarm probability is estimated from the collision declaration occurrence between object 3 and any of the asset satellites. The performance of collision alert with three SM schemes is shown in Table 2. We can see that the information gainbased method (configuration (i)) yields much smaller collision detection probability for object 2. Among those collision declarations for object 2, the average duration between the collision alert and the actual encounter time is much shorter using configuration (i) than using configurations (ii) and (iii). Thus blue team will have limited response time in choosing the appropriate collision avoidance action. This is mainly due to the long delay of detecting maneuvering object thus leading to large tracking error as seen in Table 1. In contrast, periodic switching method (configuration (ii)) achieves much more accurate collision detection with longer early warning time on average. It is worth noting that the index-based method (configuration (iii)) yields slightly worse performance than that of configuration (ii) due to its greedy manner in solving the non-indexable RBP. Nevertheless, configuration (iii) is computationally more efficient and yields satisfactory performance compared with the near-optimal policy (ii).

5 Summary and Conclusions We studied the sensor scheduling problem where N space objects are monitored by M sensors whose task is to provide the minimum mean square estimation error of the overall system subject to the cost associated with each measurement. We first formulated the sensor scheduling problem using the optimal control formalism and then derive a tractable relaxation of the original optimization problem, which provides a lower bound on the achievable performance. We proposed an open-loop periodic switching policy whose performance is arbitrarily close to the theoretical lower bound. We also discussed a special case of identical sensors and derive an index policy that coincides with the general solution to restless multi-armed bandit

Sensor Scheduling for Space Object Tracking and Collision Alert

193

problem by Whittle. Finally, we demonstrated the effectiveness of the resulting sensor management scheme for space situational awareness using a realistic space object tracking scenario with both unintentional and intentional maneuvers by RSOs that may lead to collision. Our sensor scheduling scheme outperforms the conventional information gain and covariance control based schemes in the overall tracking accuracy as well as making earlier declaration of collision events. The index policy has a slight performance degradation than the near-optimal periodic switching policy with reduced computational cost, which seems to be applicable to large-scale problems. Acknowledgment H. Chen was supported in part by ARO through grant W911NF- 08-1-0409, ONR-DEPSCoR through grant N00014-09-1-1169 and Office of Research & Sponsored Programs at University of New Orleans. The authors are grateful to the anonymous reviewers for their constructive comments to an earlier draft of this work.

References 1. Bar-Shalom, Y., Li, X.R., Kirubarajan, T.: Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software. Wiley, New York (2001) 2. Bertsekas, D.: Dynamic Programming and Optimal Control (2nd edn.). Athena Scientific, Belmont (2001) 3. Birkhoff, G.: Tres observaciones sobre el algebra lineal. Univ. Nac. Tucuman Rev. 5, 147–151 (1946) 4. Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, New York (2004) 5. Boyko, N., Turko, T., Boginski, V., Jeffcoat, D.E., Uryasev, S., Zrazhevsky, G., Pardalos, P.M.: Robust multi-sensor scheduling for multi-site surveillance. J. Comb. Optim. 22(1), 35–51 (2011) 6. Carme, S., Pham, D.-T., Verron, J.: Improving the singular evolutive extended Kalman filter for strongly nonlinear models for use in ocean data assimilation. Inverse Probl. 17, 1535–1559 (2001) 7. Carpanese, N.: Periodic Riccati difference equation: approaching equilibria by implicit systems. IEEE Trans. Autom. Contr. 45(7), 1391–1396 (2000) 8. Chang, C., Chen, W., Huang, H.: Birkhoff-von Neumann input buffered crossbar switches. In: Proc. IEEE INFORCOM. 3, 1614–1623 (2000) 9. Chen, H., Chen, G., Blasch, E.P., Pham, K.: Comparison of several space target tracking filters. In: Proceedings of SPIE Defense, Security Sensing, vol. 7730, Orlando (2009) 10. Chen, H., Chen, G., Shen, D., Blasch, E.P., Pham, K.: Orbital evasive target tracking and sensor management. In: Dynamics of Information Systems: Theory and Applications. Hirsch, M.J., Pardalos, P.M., Murphey, R. (eds.), Lecture Notes in Control and Information Sciences. Springer, New York (2010) 11. Daum, F.E.: Exact finite-dimensional nonlinear filters. IEEE Trans. Autom. Contr. 31, 616–622 (1986) 12. Daum, F.E.: Nonlinear filters: beyond the Kalman filter. IEEE Aerosp. Electron. Syst. Mag. 20, 57–69 (2005) 13. Doucet, A., de Frietas, N., Gordon, N. (eds.): Sequential Monte Carlo Methods in Practice. Statistics for Engineering and Information Science. Springer, New York (2001) 14. Evensen, G.: Data Assimilation: The Ensemble Kalman Filter. Springer, New York (2006)

194

H. Chen et al.

15. Gilks, W.R., Berzuini, C.: Following a moving target—Monte Carlo inference for dynamic Bayesian models. J. R. Stat. Soc. B 63, 127–146 (2001) 16. Gittins, J.C., Jones, D.M.: A dynamic allocation index for the sequential design of experiments. In: Progress in Statistics (European Meeting of Statisticians) (1972) 17. Gordon, N., Salmond, D., Smith, A.F.: Novel approach to nonlinear/non-Gaussian Bayesian state estimation. IEE Proc. F 140(2), 107–113 (1993) 18. Guha, S., Munagala, K.: Approximation algorithms for budgeted learning problems. In: Proceedings ACM Symposium on Theory of Computing (2007) 19. Houtekamer, P.L., Mitchell, H.L.: Data assimilation using an ensemble Kalman filter technique. Monthly Weather Rev. 126, 796–811 (1998) 20. Julier, S., Uhlmann, J., Durrant-Whyte, H.F.: A new method for the nonlinear transformation of means and covariances in filters and estimators. IEEE Trans. Autom. Contr. 45, 477–482 (2000) 21. Julier, S., Uhlmann, J.: Unscented filtering and nonlinear estimation. Proc. IEEE 92(3), 401–422 (2004) 22. Kalandros, M., Pao, L.Y.: Covariance control for multisensor systems. IEEE Trans. Aerosp. Electron. Syst. 38, 1138–1157 (2002) 23. Kreucher, C.M., Hero, A.O., Kastella, K.D., Morelande, M.R.: An information based approach to sensor management in large dynamic networks. Proc. IEEE 95, 978–999 (2007) 24. Lemaitre, M., Verfaille, G., Jouhaud, F., Lachiver, J.M., Bataille N.: Selecting and scheduling observations of agile satellites. Aerosp. Sci. Technol. 6, 367–381 (2002) 25. Li, X.R., Jilkov, V.P.: A survey of maneuvering target tracking: approximation techniques for nonlinear filtering. In: Proceedings of SPIE Conference on Signal and Data Processing of Small Targets, vol. 5428–62, Orlando (2004) 26. Maus, A., Chen, H., Oduwole, A., Charalampidis, D.: Designing collision alert system for space situational awareness. In: 20th ANNIE Conference, St. Louis, MO (2010) 27. Nino-Mora, J.: Restless bandits, partial conservation laws and indexability. Adv. Appl. Prob. 33, 76–98 (2001) 28. Papadimitriou, C., Tsitsiklis, J.: The complexity of optimal queueing network control. Math. Oper. Res. 2, 293–305 (1999) 29. Ru, J., Chen, H., Li, X.R., Chen, G.: A range rate based detection technique for tracking a maneuvering target. In: Proceedings of SPIE Conference on Signal and Data Processing of Small Targets (2005) 30. Sage, A., Melsa, J.: Estimation Theory with Applications to Communications and Control. McGraw-Hill, USA (1971) 31. Sorokin, A., Boyko, N., Boginski, V., Uryasev, S., Pardalos, P.M.: Mathematical programming tehcniques for sensor networks. Algorithms 2, 565–581 (2009) 32. Van Trees, H.L.: Detection, Estimation, and Modulation Theory, Part I. Wiley, New York (1968) 33. Whittle, P.: Restless bandits: Activity allocation in a changing world. J. Appl. Probab. 25, 287–298 (1988)

Throughput Maximization in CSMA Networks with Collisions and Hidden Terminals Sankrith Subramanian, Eduardo L. Pasiliao, John M. Shea, Jess W. Curtis, and Warren E. Dixon

Abstract The throughput at the medium-access control (MAC) layer in a wireless network that uses the carrier-sense multiple-access (CSMA) protocol is degraded by collisions caused by failures of the carrier-sensing mechanism. Two sources of failure in the carrier-sensing mechanism are delays in the carrier-sensing mechanism and hidden terminals, in which an ongoing transmission cannot be detected at a terminal that wishes to transmit because the path loss from the active transmitter is large. In this chapter, the effect of these carrier-sensing failures is modeled using a continuous-time Markov model. The throughput of the network is determined using the stationary distribution of the Markov model. The throughput is maximized by finding optimal mean transmission rates for the terminals in the network subject to constraints on successfully transmitting packets at a rate that is at least as great as the packet arrival rate.

Keywords Medium access control • Carrier-sense multiple access • CSMA Markov chain • Throughput • Convex optimization

S. Subramanian () • J.M. Shea • W.E. Dixon Department of Electrical and Computer Engineering, University of Florida, Gainesville FL 32611, USA e-mail: [email protected]; [email protected]; [email protected] E.L. Pasiliao • J.W. Curtis Munitions Directorate, Air Force Research Laboratory, Eglin AFB, FL 32542, USA e-mail: [email protected]; [email protected] 195 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 10, © Springer Science+Business Media New York 2012

196

S. Subramanian et al.

1 Introduction Quality of servise (QoS) management and throughput maximization are important capabilities for tactical and mission-critical wireless networks. In the last few years, most research efforts in this area have focused on the optimization and control of specific layers in the communications stack. Examples include specialized QoSenabled middleware, as well as protocols and algorithms at the transport, network, data link and physical layers. In this work, an analytical framework that allows optimization of the MAC protocol transmission rates in the presence of collisions is developed that will enable further work on cross-layer design involving the MAC layer. MAC layer throughput optimization focuses on manipulating specific parameters of the MAC layer, including window sizes and transmission rates to maximize/optimize the throughput in the presence of constraints. MAC protocols have been the focus of wireless networks research for the last several years. For example, the use of Markov chains was introduced in [5, 14] to analyze the performance of carrier-sense multiple access (CSMA) MAC algorithms. Performance and throughput analysis of the conventional binary exponential backoff algorithms have been investigated in [3, 4]. In most cases, previous MAC-level optimization algorithms have focused primarily on parameters and feedback from the MAC layer by excluding collisions during the analysis (cf. [5, 10]). In this chapter, we introduce and discuss an approach to include collisions in mobile ad hoc networks for MAC optimization. Preliminary work on CSMA throughput modeling and analysis was done in [5] based on the assumption that the propagation delay between neighboring nodes is zero. A continuous Markov model was developed to provide the framework and motivation for developing an algorithm that maximizes throughput in the presence of propagation delay. In [10], a collision-free model is used to quantify and optimize the throughput of the network. The feasibility of the arrival rate vector guarantees the reachability of maximum throughput, which in turn satisfies the constraint that the service rate is greater than or equal to the arrival rate, assuming that the propagation delay is zero. In general, the effects of propagation delay play a crucial role on the behavior and throughput of a communication network. Recent efforts attempted various strategies to include delay models in the throughput model. For example, in [13], delay is introduced, and is used to analyze and characterize the achievable rate region for static CSMA schedulers. Collisions, and hence delays, are incorporated in [9] in the Markov model. The mean transmission length of the packets is used as the control variable to maximize the throughput. In this chapter, a model for propagation delay is proposed and incorporated in the model for throughput, and the latter is optimized by first formulating an unconstrained problem and then a constrained problem in the presence of practical rate constraints in the network. Instead of mean transmission lengths (cf. [9]), these formulations are solved using an appropriate numerical optimization technique to obtain the optimal mean transmission rates.

Throughput Maximization in CSMA Networks

197

This chapter introduces a throughput model based on [10]. A continuous-time CSMA Markov chain is used to capture the MAC layer dynamics, and the collisions in the network are modeled based on the influence of adjacent links. The waiting times are independently and exponentially distributed. Collisions due to hidden terminals in the network are also modeled and analyzed. Link throughput is optimized by optimizing the waiting times in the network.

2 Network Model Consider an .n C k/-link network with n C k C 1 nodes as shown in Fig. 1, where network A consists of n links and network B consists of k links. Assume that all nodes can sense all other nodes in the network. However, there is a sensing delay, so that if two nodes initiate packet transmission within a time duration of ıTs , there

Fig. 1 An (n C k/-link network scenario and conflict graph

198

S. Subramanian et al.

will be a collision. Let .n C k/ denote the total number of links in the network. In a typical CSMA network, the transmitter of node m backs off for a random period before it sends a packet to its destination node, if the channel is idle. If the channel is busy, the transmitter freezes its backoff counter until the channel is idle again. This backoff time, or the waiting time, for each link m is exponentially distributed with mean 1=Rm . The objective in this chapter is to determine the optimal values of the mean transmission rates Rm , m D 1; 2; : : : ; n C k, so that the throughput in the network is maximized. For this purpose, a Markovian model is used with states defined as x i W A ! f0; 1gnCk , where i 2 A represents the status of the network, which takes the value of 1 for an active link and 0 represents an idle link. i For example, if the mth link in state i is active, then xm D 1. Previous work assumes that the propagation delay between neighboring nodes is zero (cf. [5, 10]). Since propagation delays enable the potential for collisions, there exists motivation to maximize the throughput in the network in the presence of these delays. Additionally, collisions due to hidden terminals are possible, and this chapter captures the effect of hidden terminals in the CSMA Markov chain described in the following section.

3 CSMA Markov Chain Formulations of Markov models for capturing the MAC layer dynamics in CSMA networks were developed in [5, 14]. The stationary distribution of the states and the balance equations were developed and used to quantify the throughput. Recently, a continuous-time CSMA Markov model without collisions was used in [10] to develop an adaptive CSMA to maximize throughput. Collisions were introduced in [9] in the Markov model, and the mean transmission length of the packets is used as the control variable to maximize the throughput. Since most applications experience random length of packets, the transmission rates (packets/unit time), Rm , m D 1; 2; : : : ; n; provide a practical measure. The model for waiting times is based on the CSMA random access protocol. The probability density function of the waiting time Tm is given by ( Rm exp.Rm tm /; tm 0; fTm .tm / D 0; tm < 0: Due to the sensing delay experienced by the network nodes, the probability that link m becomes active within a time duration of ıTs from the instant link l becomes active is pcm , 1 exp .Rm ıTs /

(1)

by the memoryless property of the exponential random variable. Thus, the rate of transition Gi to one of the non-collision states in the Markov chain in Fig. 2 is defined as

Throughput Maximization in CSMA Networks

199

Fig. 2 CSMA Markov chain with collision states for a 3-link network scenario with hidden terminals

Gi D

n X

0 @xui Ru

Y

1 pcl

1 .1xli / A

:

(2)

l¤u

uD1

The rate of transition Gi to one of the collision states is given by Gi D

n X uD1

0 @xui Ru

Y

1 xli .1xli / A: pcl 1 pcl

(3)

l¤u

For example, the state .1; 1; 0/ in Fig. 2 represents the collision state (for network A), which occurs when a link tries to transmit within a time span of ıTs from the instant another link starts transmitting. The primary objective of modeling the network as a continuous CSMA Markov chain is that the probability of collision-free transmission needs to be maximized. For this purpose, the rate ri is defined as

200

S. Subramanian et al.

!9 8 8 n i ˆ P Q ˆ > 1x . / ˆ ˆ > l ˆ ˆ > xi R 1 pcl ˆ ˆ > ˆ < uD1 u u l¤u = ˆ ˆ ˆ ˆ log ; i 2 AT ˆ n P i ˆ ˆ > ˆ ˆ > ˆ ˆ > x u ˆ ˆ > u ˆ : ; ˆ uD1 ˆ ˆ ! < n .1xli / P Q xli ri , i pcl 1 pcl xu Ru ˆ ˆ ˆ uD1 l¤u ˆ ˆ ; i 2 AC ˆ ˆ min .m / ˆ ˆ i ˆ mWxm ¤0 ˆ ˆ ˆ ˆ ˆ ˆ ˆ ˆ : 1; i 2 AI ;

(4)

so that the stationary distribution of the continuous-time Markov chain can be defined as exp .ri / ; p .i / , P (5) exp rj j

where, in (4), 1=m is the mean transmission length of the packets if the network c is in one of the states in set AT in sensing region A. The set AT , AC n .0; 0/T represents the set of all collision-free transmission states, where the elements in the set AC represent the collision states, and the elements in the set AcC represent the non-collision states. The set AI represents the inactive state, i.e., x i D .0; 0; 0/. In (4), the definitions for the rate of transitions in (2) and (3) are used, and (5) satisfies the detailed balance equation (cf. [11]). In addition, if there are hidden terminals (HT) in the network as shown in Fig. 2, then ri can be defined for the sensing region B in a similar way as defined for sensing region A in (4). Let sets BT , BC , and BI represent the collision-free transmission states, collision states, and the inactive states, respectively. Based on the transmission, collision, and idle states of the links in the sensing regions A and B, i belongs to one of the combinations of the sets AT , AC , AI , BT , BC , and BI . Therefore (cf. [5]), 8 ˆ FA FB ; i 2 AT [ BT ˆ ˆ ˆ ˆ ˆ GA FB ; i 2 AC [ BT ˆ ˆ ˆ ˆ ˆ ˆ FB ; i 2 AI [ BT ˆ ˆ ˆ ˆ ˆ ˆ < FA GB ; i 2 AT [ BC ri , GA GB ; i 2 AC [ BC ˆ ˆ ˆ ˆ GB ; i 2 AI [ BC ˆ ˆ ˆ ˆ ˆ ˆ FA ; i 2 AT [ BI ˆ ˆ ˆ ˆ ˆ GA ; i 2 AC [ BI ˆ ˆ ˆ : 1; i 2 AI [ BI ;

Throughput Maximization in CSMA Networks

where FA , log

!9 8 n i P Q ˆ > 1x . / ˆ > l ˆ > 1 pcl xi R ˆ > < uD1 u u l¤u = n P

ˆ ˆ ˆ ˆ :

n P uD1

GA ,

201

> > > > ;

xui u

uD1

xui Ru

.1xli / Q xli pcl 1 pcl

;

!

l¤k

:

min .m /

i ¤0 mWxm

FB and GB can be defined similarly for network B in Fig. 1.

4 Throughput Maximization To quantify the throughput, a log-likelihood function is defined as the summation over all the collision-free transmission states as X log .p .i // : (6) F .R/ , i 2.AT [BI /[.AI [BT /

By using the definition for p .i / in (5), the log-likelihood function can be rewritten as F .R/ D

n X

log

uD1

C

kCn X

Ru u

.n 1/

n X

Ru ıTs

uD1

log

vD1C1

Rv v

" .n C k/ log

.k 1/

kCn X

Rv ıTs

vDnC1

X

i 2AT [BT

C

X

exp .FA FB / C X

exp .FB / C

i 2AI [BT

C

X

C

i 2AT [BI

X

exp .FA GB /

i 2AT [BC

X

exp .GA GB / C

i 2AC [BC

X

exp .GA FB /

i 2AC [BT

exp .GB /

i 2AI [BC

exp .FA / C

X i 2AC [BI

exp .GA / C

X

# exp .1/ :

(7)

i 2AI [BI

The function F .R/ is convex (cf. [6]), and F .R/ 0 since log p x i 0. The optimization problem is defined as

202

S. Subramanian et al.

min .F .R// :

(8)

R

In addition to maximizing the log-likelihood function, certain constraints must be satisfied. The service rate S .R/ at each transmitter of a link needs to be equal to the arrival rate , and the chosen mean transmission rates Rk , k D 1; 2; : : : ; n; need to be nonnegative. Thus, the optimization problem can be formulated as min .F .R// R

subject to log log S .R/ D 0;

(9)

R 0;

(10)

and where R 2 Rn ; S .R/ 2 Rn1 ; and 2 Rn1 . The service rate for a link is the rate at which a packet is transmitted, and is quantified for sensing region A as Rk

exp log Sm .R/ ,

P j

Q l¤m

exp.Rl ıTs /

!!

m

exp rj

;

m D 1; 2; : : : ; n 1; and the denominator is defined in (4). Service rates for sensing region B can be defined similarly. Note that log m log Sm .R/ D 0; and m > 0 is convex for all m. The optimization problem defined above is a convex-constrained nonlinear programming problem, and obtaining an analytical solution is difficult. There are numerical techniques adopted in the literature which have investigated such problems in detail [1, 2, 6, 12]. As detailed in Sect. 5, a suitable numerical optimization algorithm is employed to solve the optimization problem defined in (8)–(10).

5 Simulation Results The constrained convex nonlinear programming problem defined in (8)–(10) is solved by optimizing the mean transmission rates Rm , m D 1; 2; : : : ; n C k; of the transmitting nodes in the network of Fig. 1. A MATLAB built-in function fmincon is used to solve the optimization problem by configuring it to use the interior point algorithm (cf. [7, 8]). Once the mean transmission rates are optimized, they are fixed in a simulation (developed in MATLAB) that uses the CSMA MAC protocol. The function fmincon solves the optimization problem only for a set of feasible arrival rates.

Throughput Maximization in CSMA Networks

203

Table 1 Optimal values of the mean transmission rates for a 3-link collision network with hidden terminals (refer to Fig. 2) for various values of sensing delays. The optimum values of the mean transmission rates are the solution to the constrained problem defined in (8)–(10) Max. Feasible Opt. Mean TX arrival rate rate Sensing delay 0:001 0:01 0:1

1 0:2 0:18 0:12

2 0:2 0:17 0:12

3 0:1 0:11 0:1

R1 3:94 3:78 2:56

R2 3:94 3:58 2:56

R3 1:96 2:23 1:65

Queue length evolution of the colliding nodes 1.4 Node 1 Node 2 Node 4

Queue length, in dataunits

1.2

1

0.8

0.6

0.4

0.2

0

0

1

2

3

4

5

6

7

Iterations Each iteration = 10 µsec (Slot Time)

8

9

10 x 104

Fig. 3 Queue lengths of nodes 1, 2, and 4 transmitting to the same node 3. The optimum values of the mean transmission rates are the solution to the constrained problem defined in (8)–(10). All nodes are in the sensing region, and ıTs D 0:01 ms, R1 D 3:78 dataunits/ms, R2 D 3:58 dataunits/ms, R3 D 2:23 dataunits/ms, 1 D 0:02 dataunits/ms, 2 D 0:05 dataunits/ms, 3 D 0:05 dataunits/ms

A slot time of 10 s is used, and the mean transmission lengths of the packets, 1=m , m D 1; 2; : : : ; n C k; are set to 1 ms. Further, a stable (and feasible) set of arrival rates, in the sense that the queue lengths at the transmitting nodes are stable, are chosen before the simulation.

204

S. Subramanian et al.

The collision network of Fig. 1 is simulated using the platform explained above. The optimal values of the mean transmission rates, R1 , R2 , and R3 , are obtained and tabulated as shown in Table 1 for different values of the sensing delay ıTs (note that in the scenario of Fig. 1, the sensing delay applies to the nodes in network A). The capacity of the channel is normalized to 1 dataunit/ms. The mean transmission lengths of the packets are 1=1 D 1=2 D 1=3 D 1 ms. A simulation of a CSMA system with collisions is implemented in MATLAB. Figure 3 shows the evolution of the queue lengths of nodes 1, 2, and 4 (refer to Fig. 1) for a sensing delay of ıTs D 0:01 ms. The optimal mean transmission rates (R1 D 3:78 dataunits/ms, R2 D 3:58 dataunits/ms, R3 D 2:23 dataunits/ms) are generated by fmincon, and the stable arrival rates of 1 D 0:05 dataunits/ms, 2 D 0:05 dataunits/ms, and 3 D 0:01 dataunits/ms are used.

6 Conclusion A model for collisions caused due to both sensing delays and hidden terminals is developed and incorporated in the continuous CSMA Markov chain. A constrained optimization problem is defined, and a numerical solution is suggested. Simulation results are provided to demonstrate the stability of the queues for a given stable set of arrival rates. Future efforts will focus on including queue length constraints in the optimization problem and developing online solutions to the combined collision minimization and throughput maximization problem. Acknowledgements This research is supported by a grant from AFRL Collaborative System Control STT.

References 1. Bazaraa, M.S., Sherali, H.D., Shetty, C.M.: Nonlinear Programming—Theory and Algorithms (2nd edn.). Wiley, Hoboken (1993) 2. Bertsekas, D.P.: Nonlinear Programming. Athena Scientific, Belmont (1999) 3. Bianchi, G.: IEEE 802.11—Saturation throughput analysis. IEEE Commun. Lett. 2(12), 318–320 (1998) 4. Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Select. Commun. 18(3), 535–547 (2000) 5. Boorstyn, R., Kershenbaum, A., Maglaris, B., Sahin, V.: Throughput analysis in multihop CSMA packet radio networks. IEEE Trans. Commun. 35(3), 267–274 (1987) 6. Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, New York (2004) 7. Byrd, R.H., Gilbert, J.C.: A trust region method based on interior point techniques for nonlinear programming. Math. Progr. 89, 149–185 (1996) 8. Byrd, R.H., Hribar, M.E., Jorge Nocedal, Z.: An interior point algorithm for large scale nonlinear programming. SIAM J. Optim. 9, 877–900 (1999)

Throughput Maximization in CSMA Networks

205

9. Jiang, L., Walrand, J.: Approaching throughput-optimality in distributed CSMA scheduling algorithms with collisions. IEEE/ACM Trans. Netw. 19(3), 816–829 (2011) 10. Jiang, L., Walrand, J.: A distributed CSMA algorithm for throughput and utility maximization in wireless networks. IEEE/ACM Trans. Netw. 18(3), 960–972 (2010) 11. Kelly, K.P.: Reversibility and Stochastic Networks. Wiley, Chichester (1979) 12. Luenberger, D.G.: Introduction to Linear and Nonlinear Programming. Addison-Wesley, Reading (1973) 13. Marbach, P., Eryilmaz, A., Ozdaglar, A.: Achievable rate region of CSMA schedulers in wireless networks with primary interference constraints. In: Proceedings of the IEEE Conference on Decision and Control, pp. 1156–1161 (2007) 14. Wang, X., Kar, K.: Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks. In: Proceedings of the IEEE Annual Joint Conference IEEE Computation and Communication Societies INFOCOM 2005, vol. 1, pp. 23–34 (2005)

Optimal Formation Switching with Collision Avoidance and Allowing Variable Agent Velocities Dalila B.M.M. Fontes, Fernando A.C.C. Fontes, and Am´elia C.D. Caldeira

Abstract We address the problem of dynamically switching the geometry of a formation of a number of undistinguishable agents. Given the current and the final desired geometries, there are several possible allocations between the initial and final positions of the agents as well as several combinations for each agent velocity. However, not all are of interest since collision avoidance is enforced. Collision avoidance is guaranteed through an appropriate choice of agent paths and agent velocities. Therefore, given the agent set of possible velocities and initial positions, we wish to find their final positions and traveling velocities such that agent trajectories are apart, by a specified value, at all times. Among all the possibilities we are interested in choosing the one that minimizes a predefined performance criteria, e.g. minimizes the maximum time required by all agents to reach the final geometry. We propose here a dynamic programming approach to solve optimally such problems. Keywords Autonomous agents • Optimization • Dynamic programming • Agent formations • Formation geometry • Formation switching • Collision avoidance

D.B.M.M. Fontes () Faculdade de Economia, Universidade do Porto, Rua Dr. Roberto Frias, 4200-464 Porto, Portugal e-mail: [email protected] F.A.C.C. Fontes Faculdade de Engenharia, Universidade do Porto, Rua Dr. Roberto Frias, 4200-465 Porto, Portugal e-mail: [email protected] A.C.D. Caldeira Departamento de Matem´atica, Instituto Superior de Engenharia do Porto, R. Dr. Ant´onio Bernardino de Almeida 431, 4200-072 Porto, Portugal e-mail: [email protected] 207 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 11, © Springer Science+Business Media New York 2012

208

D.B.M.M. Fontes et al.

1 Introduction In this paper, we study the problem of switching the geometry of a formation of undistinguishable agents by minimizing some performance criterion. The questions addressed are, given the initial positions and a set of final desirable positions, which agent should go to a specific final position, how to avoid collision between the agents, and which should be the traveling velocities of each agent between the initial and final positions. The performance criterion used in the example explored is to minimize the maximum traveling time, but the method developed— based on dynamic programming—is sufficiently general to accommodate many different criteria. Formations of undistinguishable agents arise frequently both in nature and in mobile robotics. The specific problem of switching the geometry of a formation arises in many cooperative agents missions, due to the need to adapt to environmental changes or to adapt to new tasks. An example of the first type is when a formation has to go through a narrow passage, or deviate from obstacles, and must reconfigure to a new geometry. Examples of adaptation to new tasks arise in robot soccer teams: when a team is in an attack formation and loses the ball, it should switch to a defence formation more appropriate to the new task. Another example arises in the detection and containment of a chemical spillage, the geometry of the formation for the initial task of surveillance, should change after detection occurs, switching to a formation more appropriate to determine the perimeter of the spill. Research in coordination and control of teams of several agents (that may be robots, ground, air, or underwater vehicles) has been growing fast in the past few years. Application areas include unmanned aerial vehicles (UAVs) [4, 18], autonomous underwater vehicles (AUVs) [16], automated highway systems (AHSs) [3, 17], and mobile robotics [20, 21]. While each of these application areas poses its own unique challenges, several common threads can be found. In most cases, the vehicles are coupled through the task they are trying to accomplish, but are otherwise dynamically decoupled, meaning the motion of one does not directly affect the others. For a survey in cooperative control of multiple vehicles systems, see, e.g., the work by Murray [11]. Regarding research on the optimal formation switching problem, it is not abundant, although it has been addressed by some authors. Desai et al. in [5], model mobile robots formation as a graph. The authors use the so-called “control graphs” to represent the possible solutions for formation switching. In this method, for a graph having n vertices there are nŠ.n 1/Š=2n1 control graphs, and switching can only happen between predefined formations. The authors do not address collision or velocity issues. Hu and Sastry [9] study the problems of optimal collision avoidance and optimal formation switching for multiple agents on a Riemannian manifold. However, no choice of agent traveling velocity is considered. It is assumed that the underlying manifold admits a group of isometries, with respect to which the Lagrangian function is invariant. A reduction method is used to derive optimality conditions for the solutions. In [19] Yamagishi describes a decentralized controller for the reactive formation switching of a team of autonomous mobile robots. The focus is on how a structured formation of agents can

Optimal Formation Switching

209

reorganize into a nonrigid formation based on changes in the environment. The controller utilizes nearest-neighbor artificial potentials (social rules) for collision-free formation maintenance and environmental changes act as a stimulus for switching between formations. A similar problem, where a set of agents must perform a fixed number of different tasks on a set of targets, has been addressed by several authors. The methods developed include exhaustive enumeration (see Rasmussen et al. [13]), branch-and-bound (see Rasmussen and Shima [12]), network models (see Schumacher et al. [14, 15]), and dynamic programming (see Jin et al. [10]). None of these works address velocity issues. A problem of formation switching has also been addressed in [6, 7] using dynamic programming. However, the possible use of different velocities for each agent was not addressed. But the possibility of slowing down some of the agents might, as we will show in an example, achieve better solutions while avoiding collision between agents. We propose a dynamic programming approach to solve the problem of formation switching with collision avoidance and agent velocities selection, that is, the problem of deciding which agent moves to which place in the next formation guaranteeing that at any time the distance between any two of them is at least some predefined value. In addition, each agent can also explore the possibility of modifying its velocity to avoid collision, which is a main distinguishing feature from previous work. The formation switching performance is given by the time required for all agents to reach their new position, which is given by the maximum traveling time amongst individual agent traveling times. Since we want to minimize the time required for all agents to reach their new position, we have to solve a minmax problem. However, the methodology we propose can be used with any separable performance function. The problem addressed here should be seen as a component of a framework for multiagent coordination, incorporating also the trajectory control component [8], which allows to maintain or change formation while following a specified path in order to perform cooperative tasks. This paper is organized as follows. In the next section, the problem of optimal reorganization of agent formations with collision avoidance is described and formally defined. In Sect. 3, a dynamic programming formulation of the problem is given and discussed. In Sect. 4, we discuss computational implementation issues of the dynamic programming algorithm, namely an efficient implementation of the main recursion as well as efficient data representations. A detailed description of the algorithms is also provided. Next, an example is reported to show the solution modifications when using velocities selection and collision avoidance. Some conclusions are drawn in the final section.

2 The Problem In our problem a team of N identical agents has to switch from their current formation to some other formation (i.e., agents have a specific goal configuration not related to the positions of the others), possibly unstructured, with collision avoidance. To address collision avoidance, we impose that the trajectories of the

210

D.B.M.M. Fontes et al.

agents must satisfy the separation constraint that at any time the distance between (the center of) any two of them is at least , for some positive . (So, should be at least the diameter of an agent.) The optimal (joint) trajectories are the ones that minimize the maximum trajectory time of individual agents. Our approach can be used either centralized or decentralized, depending on the agent capabilities. In the latter case, all the agents would have to run the algorithm, which outputs an optimal solution, always the same if many exist, since the proposed method is deterministic. Regarding the new formation, it can be either a pre-specified formation or a formation to be defined according to the information collected by the agents. In both cases, we do a preprocessing analysis that allows us to come up with the desired locations for the next formation. This problem can be restated as the problem of allocating to each new position exactly one of the agents, located in the old positions, and determine each agent velocity. From all the possible solutions we are only interested in the ones where agent collision is prevented. Among these, we want to find one that minimizes the time required for all agents to move to the target positions, that is, an allocation which has the least maximum individual agent traveling time. To formally define the problem, consider a set of N agents moving in a space Rd , so that at time t, agent i has position qi .t/ in Rd (we will refer to qi .t/ D .xi .t/; yi .t// when our space is the plane R2 ). The position of all agents is defined d N by the N-tuple Q.t/ D Œqi .t/N . We assume that each agent is holonomic i D1 in R and that we are able to choose its velocity, so that its kinematic model is a simple integrator qPi .t/ D #i .t/ a:e: t 2 RC : The initial positions at time t D 0 are known and given by A D Œai N i D1 D Q.0/. Suppose a set of M (with M N ) final positions in Rd is specified as F D ff1 ; f2 ; : : : ; fM g. The problem is to find an assignment between the N agents and N final positions in F . That is, we want to find an N-tuple B D Œbi N i D1 of different elements of F , such that at some time T > 0, Q.T / D B and all b i 2 F , with bi ¤ bk . There are M N N Š such N-tuples (the permutations of a set of N elements chosen from a set of M elements) and we want to find a procedure to choose an N-tuple minimizing a certain criterion that is more efficient than total enumeration. The criterion to be minimized can be very general since the procedure developed is based on dynamic programming which is able to deal with general cost functions. Examples can be minimizing the total distance traveled by the agents Minimize

N X

kbi ai k;

i D1

the total traveling time Minimize

N X i D1

kbi ai k=k#i k;

Optimal Formation Switching

211

or the maximum traveling time Minimize max kbi ai k=k#i k: i D1;:::;N

We are also interested in selecting the traveling velocities of each agent. Assuming constant velocities, these are given by #i .t/ D #i D vi

bi ai ; kbi ai k

where the constant speeds are selected from a discrete set D fVmin ; : : : ; Vmax g. Moreover, we are also interested in avoiding collision between agents. We say that two agents i , k (with i ¤ k) do not collide if their trajectories maintain a certain distance apart, at least , at all times. The non-collision conditions is kqi .t/ qk .t/k

8t 2 Œ0; T ;

(1)

where the trajectory is given by qi .t/ D ai C #i .t/t;

t 2 Œ0; T :

We can then define a logic-valued function c as c.ai ; bi ; vi ; ak ; bk ; vk / D

1 if collision between i and k ocurs 0 otherwise

With these considerations, the problem (in the case of minimizing the maximum traveling time) can be formulated as follows: min

max kbi ai k=vi ;

b1 ;:::;bN ;v1 ;:::;vN i D1;:::;N

Subject to bi 2 F 8i; 8i; k with i ¤ k; bi ¤ bk 8i; vi 2 ; c.ai ; bi ; vi ; ak ; bk ; vk / D 0; 8i; k with i ¤ k: Instead of using the set F of d-tuples, we can define a set J D f1; 2; : : : ; M g of indexes to such d-tuples, and also a set I D f1; 2; : : : ; M g of indexes to the agents. Let ji in J be the target position for agent i , that is, bi D fji . Define also the distances dij D kfj ai k which can be pre-computed for all i 2 I and j 2 J . Redefining, without changing the notation, the function c to take as arguments the indexes to the agent positions instead of the positions (i.e., c.ai ; fji ; vi ; ak ; fjk ; vk / is simply represented as c.i; ji ; vi ; k; jk ; vk /), the problem can be reformulated into the form

212

D.B.M.M. Fontes et al.

min

max dij =vi ;

j1 ;:::;jN ;v1 ;:::;vN i D1;:::;N

Subject to ji 2 J 8i 2 I; 8i; k 2 I with i ¤ k; ji ¤ jk 8i 2 I; vi 2 ; c.i; ji ; vi ; ak ; jk ; vk / D 0; 8i; k with i ¤ k:

3 Dynamic Programming Formulation Dynamic programming (DP) is an effective method to solve combinatorial problems of a sequential nature. It provides a framework for decomposing an optimization problem into a nested family of subproblems. This nested structure suggests a recursive approach for solving the original problem using the solution to some subproblems. The recursion expresses an intuitive principle of optimality [2] for sequential decision processes; that is, once we have reached a particular state, a necessary condition for optimality is that the remaining decisions must be chosen optimally with respect to that state.

3.1 Derivation of the Dynamic Programming Recursion: The Simplest Problem We start by deriving a DP formulation for a simplified version of problem: where collision is not considered and different velocities are not selected. The collision avoidance and the selection of velocities for each agent are introduced later. Consider that there are N agents i D 1; 2; : : : ; N to be relocated from known initial location coordinates to target locations indexed by set J . We want to allocate exactly one of the agents to each position in the new formation. In our model a stage i contains all states S such that jS j i , meaning that i agents have been allocated to the targets in S . The DP model has N stages, with a transition occurring from a stage i 1 to a stage i , when a decision is made about the allocation of agent i . Define f .i; S / to be the value of the best allocation of agents 1; 2; : : : ; i to the i targets in set S , that is, the allocation requiring the least maximum time the agents take to go to their new positions. Such value is found by determining the least maximum agent traveling time between its current position and its target position. For each agent, i , the traveling time to the target position j is given by dij =vi . By the previous definition, the minimum traveling time of the i 1 agents to the target positions in set S nfj g is given by f .i 1; S n fj g/. From the above, the minimum traveling time of all i agents to the target positions in S they are assigned to, given that agent i travels at velocity vi , without agent collisions, is obtained by examining all possible target locations j 2 S (see Fig. 1).

Optimal Formation Switching

213

Fig. 1 Dynamic programming recursion for an example with N D 5 and stage i D 4

The dynamic programming recursion is then defined as ˚ f .i; S / D min dij =vi _ f .i 1; S n fj g/ ; j 2S

(2)

where X _ Y denotes the maximum between X and Y . The initial conditions for the above recursion are provided by ˚ f .1; S / D min d1j =v1 ; j 2S

8S J;

(3)

and all other states are initialized as not yet computed. Hence, the optimal value for the performance measure, that is, the minimum traveling time needed for all N agents to assume their new positions in J , is given by f .N; J /:

(4)

3.2 Considering Collision Avoidance and Velocities Selection Recall function c for which c.i; j; vi ; a; b; va / takes value 1 if there is collision between pair of agents i and a traveling to positions j and b with velocities vi and va , respectively, and takes value 0 otherwise. To analyze if the agent traveling through a newly defined trajectory collides with any agent traveling through previously determined trajectories, we define a recursive function. This function checks the satisfaction of the collision condition, given by (1), in turn, between the agent which had the trajectory defined last and each of the agents for which trajectory decisions have already been made. We note that by trajectory we understand not only the path between the initial and final positions but also a timing law and an implicitly defined velocity. Consider that we are in state .i; S / and that we are assigning agent i to target j . Further let vi 1 be the traveling velocity for agent i 1. Since we are solving state .i; S / we need state .i 1; S n fj g/, which has already been computed. (If this is not

214

D.B.M.M. Fontes et al.

Fig. 2 Collision recursion

the case, then we must compute it first.) In order to find out if this new assignment is possible, we need to check if at any point in time agent i , traveling with velocity vi will collide with any of the agents 1; 2; : : : ; i 1 for which we have already determined the target assignment and traveling velocities. Let us define a recursive function C.i; vi ; j; k; V; S / that assumes the value one if a collision occurs between agent i traveling with velocity vi to j and any of the agents 1; 2; : : : ; k , with k < i , traveling to their targets, in set S , with their respective velocities V D Œv1 v2 vk and assumes the value zero if no such collisions occurs. This function works in the following way (see Fig. 2): 1. First it verifies c.i; vi ; j; k; vk ; Bj /, that is, it verifies if there is collision between trajectory i ! j at velocity vi and trajectory k ! Bj at velocity vk , where Bj is the optimal target for agent k when targets in set S n fj g are available for agents 1; 2; : : : ; k. If this is the case it returns the value 1. 2. Otherwise, if they do not collide, it verifies if trajectory i ! j at velocity vi collides with any of the remaining agents. That is, it calls the collision function C .i; vi ; j; k 1; V 0 ; S 0 /, where S 0 D S n fBj g and V D ŒV 0 vk . The collision recursion is therefore written as ˚ C.i; vi ; j; k; V; S / D c.i; vi ; j; k; vk ; Bj / _ C.i; vi ; j; k 1; V 0 ; S 0 /

(5)

where Bj D Bestj .k; V 0 ; S 0 /, V D ŒV 0 vk , S 0 D S n fj g The initial conditions for recursion (5) are provided by C.i; vi ; j; 1; v1 ; fkg/ D fc.i; vi ; j; 1; v1 ; k/g ; 8i 2 I I 8j; k 2 J with j ¤ kI 8vi ; v1 2 . All other states are initialized as not yet computed.

Optimal Formation Switching

215

The dynamic programming recursion for the minimal time-switching problem with collision avoidance and velocities selection is then ˚ f .i; V; S / D min d.i; j /=vi _ f .i 1; V 0 ; S 0 / _ M C.i; vi ; j; i 1; V 0 ; S 0 / ; (6) j 2S

where V D ŒV 0 vi , S 0 D S n fj g, and C is the collision function. The initial conditions are given by f .1; v1 ; fj g/ D fd.1; j /=v1 g ; 8j 2 J and 8v1 2 :

(7)

All other states being initialized as not computed. To determine the optimal value for our problem we have to compute min f .N; V; J /: all N-tuples V

4 Computational Implementation The DP procedure we have implemented exploits the recursive nature of the DP formulation by using a backward–forward procedure. Although a pure forward DP algorithm can be easily derived from the DP recursion, (6) and (7), such implementation would result in considerable waste of computational effort since, generally, complete computation of the state space is not required. Furthermore, since the computation of a state requires information contained in other states, rapid access to state information should be sought. The main advantage of the backward–forward procedure implemented is that the exploration of the state space graph, that is, the solution space, is based upon the part of the graph which has already been explored. Thus, states which are not feasible for the problem are not computed, since only states which are needed for the computation of a solution are considered. The algorithm is dynamic as it detects the needs of the particular problem and behaves accordingly. States at stage 1 are either nonexistent or initialized as given in (3). The DP recursion, (2), is then implemented in a backward–forward recursive way. It starts from the final states .N; V; J / and while moving backward visits, without computing, possible states until a state already computed is reached. Initially, only states in stage 1, initialized by (3), are already computed. Then, the procedure is performed in reverse order, that is, starting from the state last identified in the backward process, it goes forward through computed states until a state .i; V 0 ; S 0 / is found which has not yet been computed. At this point, again it goes backward until a computed state is reached. This procedure is repeated until the final states .N; V; J / for all V are reached with a value that cannot be improved by any other alternative solution. From these we choose the minimum one. The main advantage of this backward–forward recursive algorithm is that only intermediate states needed are visited and from these only the feasible ones that may yield a better solution are computed.

216

D.B.M.M. Fontes et al.

As said before, due to the recursive nature of (2), state computation implies frequent access to other states. Recall that a state is represented by a number, a sequence, and a set. Therefore, sequence operations like adding or removing an element and set operations like searching, deletion, and insertion of a set element must be performed efficiently.

4.1 Sequence Representation and Operation Consider a sequence of length n, or an n-tuple, with k possible values for each element. (In the sequence of our example n D N is the number of agents and k D j j the number of possible velocity values.) There are k n possible sequences to be represented. If sequences are represented by integers in the range 0 k n 1 then it is easy to implement sequence operations such as partitions. Thus, we represent a sequence as a numeral with n digits in the base k. The partition of a sequence with l digits that we are interested on is the one corresponding to the first l 1 digits and the last digit. Such a partition can be obtained by performing the integer division in the base k and taking the remainder of such division. Example 1. Consider a sequence of length n D 4 with k D 3 possible values v0 ; v1 , and v2 . This is represented by numeral with n digits in the base k as Œv1 ; v0 ; v2 ; v1 is represented by1 0 2 13 D 1 33 C 0 32 C 2 31 C 1 30 D 34 Partition of this sequence by the last element can be performed by integer division (DIV) in the base k and taking the remainder (MOD) of such division, V D 1 0 2 13 D 34 can be split into ŒV 0 vi as follows: V 0 D 1 0 23 D 1 32 C 2 30 D 11 D 34 DIV 3 and vi D 13 D 1 D 34 MOD 3:

4.2 Set Representation and Operation A computationally efficient way of storing and operating sets is the bit-vector representation, also called the boolean array, whereby a computer word is used to keep the information related to the elements of the set. In this representation a universal set U D f1; 2; : : : ; ng is considered. Any subset of U can be represented by a binary string (a computer word) of length n in which the i th bit is set to 1 if i is an element of the set, and set to 0 otherwise. So, there is a one-to-one correspondence between all possible subsets of U (in total 2n ) and all binary strings

Optimal Formation Switching

217

Algorithm 1 DP for finding agent–target allocations and corresponding velocities Input: The agent set, locations and velocities, the target set and locations, and the distance function; Compute the distance for every pair agent-target .dij /; Label all states as not yet computed; f .n; V; S/ D 1 ; for all n D 1; 2; : : : ; N , all V with n components, S 2 J ; Initialize states at stage one as ˚ f .1; V; fj g/ D d1j =v1 ; 8V 2 ; j 2 J: Call Comput e.N; V; J / for all sequences V with N components; Output: Solution performance; Call Al locat i on.N; V ; J /; Output: Agent targets and velocities;

of length n. Since there is also a one-to-one correspondence between binary strings and integers, the sets can be efficiently stored and worked out simply as integer numbers. A major advantage of such implementation is that the set operations, location, insertion, or deletion of a set element can be performed by directly addressing the appropriate bit. For a detailed discussion of this representation of sets see, e.g., the book by Aho et al. [1]. Example 2. Consider the Universal set U=f1; 2; 3; 4g of n D 4 elements. This set and any of its subsets can be represented by a binary string of length 4, or equivalently its representation as an integer in the range 0–15. U D f1; 2; 3; 4g is represented by 1111B D 15: A subset A D f1; 3g is represented by 0101B D 5: The flow of the algorithm is managed by Algorithm 1, which starts by labeling all states (subproblems) as not yet computed, that is, it assigns to them a 1 value. Then, it initializes states in stage 1, that is subproblems involving 1 agent, as given by (3). After that, it calls Algorithm 2 with parameters .N; V; J /. Algorithm 2, that implements recursion (2), calls Algorithm 3 to check for collisions every time it attempts to define one more agent–target allocation. This algorithm is used to find out whether the newly established allocation satisfies the collision regarding all previously defined allocations or not, feeding the result back to Algorithm 2. Algorithm 1, called after Algorithm 2 has finished,also implements a recursive function with which the solution structure, that is, the agent–target allocation, is retrieved.

218

D.B.M.M. Fontes et al.

Algorithm 2 Recursive function: compute optimal performance Recursive Compute.i; V; S/; if f .i; V; S/ ¤ 1 then return f .i; V; S/ to caller; end Set min D 1; for each j 2 S 0 do S 0 D S n fj g; V 0 D V DIV nvel; vi D V MOD nvel; Call Collision.i; vi ; j; i 1; V 0 ; S 0 / if Col.i; j; i 1; S 0 / D 0 then Call C omput e .i 1; V 0 ; S 0 /; tij D dij =vi ; aux D max f .i 1; V 0 ; S 0 / ; tij ; if aux mi n then min D aux; bestj D j ; end end end Bj .i; V; S/ D bestj ; value Store information:target Return: f .i; V; S/;

f .i; V; S/ D mi n;

Algorithm 2 is a recursive algorithm that computes the optimal solution cost, that is, it implements (2). This function receives three arguments: the agents to be allocated, their respective velocity values, and the set of target locations available to them, all represented by integer numbers. It starts by checking whether the specific state .i; V; S / has already been computed or not. If so, the program returns to the point where the function was called; otherwise, the state is computed. To compute state .i; V; S /, all possible target locations j 2 S that might lead to a better subproblem solution are identified. The function is then called with arguments (i 1; V 0 ; S 0 ), where V 0 D V DI V nvel (V 0 is the subsequence of v containing the first i 1 elements, and nvel the number of possible velocity values) and S 0 D S n fj g, for every j such that allocating agent i to target j does not lead to any collision with previously defined allocations. This condition is verified by Algorithm 3. Algorithm 3 is a recursive algorithm that checks the collision of a specific agenttarget allocation traveling at a specific velocity with the set of allocations and velocities previously established, that is, it implements (5). This function receives six arguments: the newly defined agent–target allocation i ! j and its traveling velocity vi and the previously defined allocations and respective velocities to check with, that is agents 1; 2; : : : ; k, their velocities and their target locations S . It starts by checking the collision condition, given by (1), for the allocation pair i ! j traveling at velocity vi and k ! Bj traveling at velocity vk , where Bj is the optimal target for agent k when agents 1; 2; : : : ; k are allocated to targets in S . If there is collision it returns 1; otherwise it calls itself with arguments .i; vi ; j; k 1; V 0 ; S n fBj g/. Algorithm 4 is also a recursive algorithm and it backtracks through the information stored while solving subproblems, in order to retrieve the solution structure, that is, the actual agent–target allocation and agent velocity. This algorithm works

Optimal Formation Switching

219

Algorithm 3 Recursive function: find if the trajectory of the allocation i ! j at velocity vi collides with any of the existing allocations to the targets in S at the specified velocities in V Recursive Collision.i; vi ; j; k; V; S/; if Col .i; vi ; j; k; V; S/ ¤ 1 then return C ol .i; vi ; j; k; V; S/ to caller; end Bj D Bj .k; V; S/; if collision condition is not satisfied then Col .i; vi ; j; k; V; S/ D 1; return C ol .i; vi ; j; k; V; S/ to caller; end S 0 D S n fBj g; V 0 D V DIV nvel; vk D V MOD nvel; Call Collision.i; vi ; j; k 1; V 0 ; S 0 /; Store information:

C ol .i; vi ; j; k; V; S/ D 0;

Return: C ol .i; vi ; j; k; V; S/;

Algorithm 4 Recursive function: retrieve agent–target allocation and agents velocity Recursive Allocation.i; V; S/; if S ¤ ¿ then vi D VMODmvel; j DtargetBj .i; V; S/; Vloc.i / D vi ; Alloc.i / D j ; V 0 D VDI V nvel; S 0 D S n fj g; CALL Allocation.i 1; V 0 ; S 0 /; end Return: Alloc;

backward from the final state .N; V ; J /, corresponding to the optimal solution obtained, and finds the partition by looking at the agent traveling velocity vN D V MOD nvel and at the target stored for this state Bj .N; V ; J /, with which it can build the structure of the solution found. Algorithm 3 receives three arguments: the agents, their traveling velocity, and the set of target locations. It starts by checking whether the agent current locations set is empty. If so, the program returns to the point where the function was called; otherwise the backtrack information of the state is retrieved and the other needed states evaluated.

220

D.B.M.M. Fontes et al.

5 An Example An example is given to show how agent–target allocations are influenced by imposing that no collisions are allowed both with a single fixed velocity value for all agents and with the choice of agent velocities from three different possible values. In this example we have decided to use dij as the Euclidian distance although any other distance measure may have been used. The separation constraints impose, at any point in time, the distance between any two agent trajectories to be at least 15 points; otherwise it is considered that those two agents collide. Consider four agents, A, B, C, and D with random initial positions as given in Table 1 and four target positions 1, 2, 3, and 4 in a diamond formation as given in Table 2. We also consider three velocity values: v1 D 10, v2 D 30, v3 D 50. In Fig. 3 we give the graphical representation of the optimal agent–target allocation found, when a single velocity value is considered and collisions are allowed and no collisions are allowed, respectively. As it can be seen in the top part of Fig. 3, that is, when collisions are allowed, the trajectory of agents A and D do not remain apart, by 15 points, at all times. Therefore, when no collisions are enforced the agent–target allocation changes with an increase in the time that it takes for all agents to assume their new positions. In Fig. 4 we give the graphical representation of an optimal agent–target allocation found, when there are three possible velocity values to choose from and collisions are allowed and no collisions are allowed, respectively. As it can be seen in the top part of the Fig. 4, that is, when collisions are allowed, the trajectory of agents A and D do not remain apart, by 15 points, at all times, since the agents move at the same velocity. Therefore, when no collisions are enforced although the agent–target allocation remains the same, agent A has it velocity decreased and therefore its trajectory no longer collides with the trajectory of agent D. Furthermore, since agents A trajectory is smaller this can be done with no increase in the time that it takes for all agents to assume their new positions. Table 1 Agents random initial location

Location xi yi Agent A Agent B Agent C Agent D

35 183 348 30

Target 1 Target 2 Target 3 Target 4

Location xi yi 95 258 294 258 195 169 195 347

Table 2 Target locations, in diamond formation

185 64 349 200

Optimal Formation Switching

221

Fig. 3 Comparison of solutions with and without collision for the single velocity case

6 Conclusion We have developed an optimization algorithm to decide how to reorganize a formation of vehicles into another formation of different shape with collision avoidance and agent traveling velocity choice, which is a relevant problem in cooperative control applications. The method proposed here should be seen as a component of a framework for multiagent coordination/cooperation, which must necessarily include other components such as a trajectory control component.

222

D.B.M.M. Fontes et al.

Fig. 4 Comparison of the solutions with and without collision for the velocity choice case

The algorithm proposed is based on a dynamic programming approach that is very efficient for small dimensional problems. As explained before, the original problem is solved by combining, in an efficient way, the solution to some subproblems. The method efficiency improves with the number of times the subproblems are reused, which obviously increases with the number of feasible solutions. Moreover, the proposed methodology is very flexible, in the sense that it easily allows for the inclusion of additional problem features, e.g., imposing geometric constraints on each agent or on the formation as a whole, using nonlinear trajectories, among others.

Optimal Formation Switching

223

Acknowledgements Research supported by COMPETE & FEDER through FCT Projects PTDC/EEA-CRO/100692/2008 and PTDC/EEA-CRO/116014/2009.

References 1. Aho, A.V., Hopcroft, J.E., Ullman, J.D.: Data Structures and Algorithms. Addison-Wesley, Reading MA (1983) 2. Bellman, R.: Dynamic Programming. Princeton University Press, Princeton, USA (1957) 3. Bender, J.G.: An overview of systems studies of automated highway systems. IEEE Trans. Vehicular Tech. 40(1 Part 2), 82–99 (1991) 4. Buzogany, L.E., Pachter, M., d’Azzo, J.J.: Automated control of aircraft in formation flight. In: AIAA Guidance, Navigation, and Control Conference and Exhibit, 1349–1370, Monterey, California (1993) 5. Desai, J.P., Ostrowski, P., Kumar, V.: Modeling and control of formations of nonholonomic mobile robots. IEEE Trans. Robotic Autom. 17(6), 905–908 (2001) 6. Fontes, D.B.M.M., Fontes, F.A.C.C.: Optimal reorganization of agent formations. WSEAS Trans. Syst. Control. 3(9), 789–798 (2008) 7. Fontes, D.B.M.M., Fontes, F.A.C.C.: Minimal switching time of agent formations with collision avoidance. Springer Optim. Appl. 40, 305–321 (2010) 8. Fontes, F.A.C.C., Fontes, D.B.M.M., Caldeira, A.C.D.: Model predictive control of vehicle formations. In: Pardalos, P., Hirsch, M.J., Commander, C.W., Murphey, R. (eds.) Optimization and Cooperative Control Strategies. Lecture Notes in Control and Information Sciences, Vol. 381. Springer Verlag, Berlin (2009). ISBN: 978-3-540-88062-2 9. Hu, J., Sastry, S.: Optimal collision avoidance and formation switching on Riemannian manifolds. In: IEEE Conference on Decision and Control, IEEE 1998, vol. 2, 1071–1076 (2001) 10. Jin, Z., Shima, T., Schumacher, C.J.: Optimal scheduling for refueling multiple autonomous aerial vehicles. IEEE Trans. Robotic. 22(4), 682–693 (2006) 11. Murray, R.M.: Recent research in cooperative control multivehicle systems. J. Dyn. Syst. Meas. Control. 129, 571–583 (2007) 12. Rasmussen, S.J., Shima, T.: Branch and bound tree search for assigning cooperating UVAs to multiple tasks. In: Institute of Electrical and Electronic Engineers, American Control Conference 2006, Minneapolis, Minnesota, USA (2006) 13. Rasmussen, S.J., Shima, T., Mitchell, J.W., Sparks, A., Chandler, P.R.: State-space search for improved autonomous UAVs assignment algorithm. In: IEEE Conference on Decision and Control, Paradise Island, Bahamas (2004) 14. Schumacher, C.J., Chandler, P.R., Rasmussen, S.J.: Task allocation for wide area search munitions via iterative network flow. In: American Institute of Aeronautics and Astronautics, Guidance, Navigation, and Control Conference 2002, Reston, Virginia, USA (2002) 15. Schumacher, C.J., Chandler, P.R., Rasmussen, S.J.: Task allocation for wide area search munitions with variable path length. In: Institute of Electrical and Electronic Engineers, American Control Conference 2003, New York, USA (2003) 16. Smith, T.R., Hanssmann, H., Leonard, N.E.: Orientation control of multiple underwater vehicles with symmetry-breaking potentials. In IEEE Conf. Decis. Control. 5, 4598–4603 (2001) 17. Swaroop, D., Hedrick, J.K.: Constant spacing strategies for platooning in automated highway systems. J. Dyn. Syst. Meas. Control. 121, 462 (1999) 18. Wolfe, J.D., Chichka, D.F., Speyer, J.L.: Decetntralized controllers for unmanned aerial vehicle formation flight. In: AIAA Guidance, Navigation, and Control Conference and Exhibit, 96–3833, San Diego, California (1996)

224

D.B.M.M. Fontes et al.

19. Yamagishi, M.: Social rules for reactive formation switching. Technical Report UWEETR2004-0025. Department of Electrical Engineering, University of Washington, Seattle, Washington, USA (2004) 20. Yamaguchi, H.: A cooperative hunting behavior by mobile-robot troops. Int. J. Robotic. Res. 18(9), 931 (1999) 21. Yamaguchi, H., Arai, T., Beni, G.: A distributed control scheme for multiple robotic vehicles to make group formations. Robotic. Autonom. Syst. 36(4), 125–147 (2001)

Computational Studies of Randomized Multidimensional Assignment Problems Mohammad Mirghorbani, Pavlo Krokhmal, and Eduardo L. Pasiliao

Abstract In this chapter, we consider a class of combinatorial optimization problems on hypergraph matchings that represent multidimensional generalizations of the well-known linear assignment problem (LAP). We present two algorithms for solving randomized instances of MAPs with linear and bottleneck objectives that obtain solutions with guaranteed quality. Keywords Multidimensional assignment problem • Hypergraph matching problem • Probabilistic analysis

1 Introduction In the simplest form of the assignment problem, two sets V and W with size jV j D jW j D n are given. The goal is to find a permutation of the elements of W , D .j1 ; j2 ; : : : ; jn /, where the i th element of V isPassigned to the element ji D .i / from W in such a way that the cost function niD1 ai .i / is minimized. Here, aij is the cost of assigning element i of V to the element j of W . This problem is widely known as the classical linear assignment problem (LAP). The LAP can be

M. Mirghorbani Department of Mechanical and Industrial Engineering, The University of Iowa, 801 Newton Road Iowa City, IA 52246, USA e-mail: [email protected] P. Krokhmal () Department of Mechanical and Industrial Engineering, The University of Iowa, 3131 Seamans Center, Iowa City, IA 52242, USA e-mail: [email protected] E.L. Pasiliao Air Force Research Lab, Eglin AFB, 101 West Eglin. Boulevard, Eglin AFB, FL, USA e-mail: [email protected] 225 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 12, © Springer Science+Business Media New York 2012

226

M. Mirghorbani et al.

Fig. 1 The underlying bi-partite graph for an assignment problem with n D 4

represented by a complete weighted bipartite graph G D .V; W I E/, with node sets V and W , where jV j D jW j D n and weight aij for the edge .vi ; wj / 2 E (Fig. 1), such that an optimal solution for LAP corresponds to a minimum-weight matching in the bipartite graph G. The LAP is well known to be polynomially solvable in O.n3 / time using the celebrated Hungarian method [11]. A mathematical programming formulation of the LAP reads as Ln

D min

xij 2f0;1g

s. t.

n n X X

aij xij

i D1 j D1 n X

xij D 1;

j D 1; : : : ; n;

xij D 1;

i D 1; : : : ; n;

i D1 n X

(1)

j D1

where it is well known that the integrality of variables xij can be relaxed: 0 xij 1. The LAP also admits the following permutation-based formulation: min

2˘

n X

ai .i / ;

(2)

i D1

where ˘ is the set of all permutations of the set f1; : : : ; ng. Multidimensional extensions of the bipartite graph matching problems, such as the LAP, quadratic assignment problem (QAP), and so on, can be presented in the framework of hypergraph matching problems. A hypergraph H D .V; E/, also called a set system, is a generalization of the graph concept, where a hyperedge may connect two or more vertices from the set V: ˇ (3) E D fe V ˇ jej 2g;

Computational Studies of Randomized Multidimensional Assignment Problems

227

Fig. 2 A perfect matching in a 3-partite 3-uniform hypergraph

A hypergraph is called k-uniform if all its hyperedges have the size k: ˇ E D fe 2 V ˇ jej D kg: Observe that a regular graph is a 2-uniform hypergraph. A subset V 0 V of vertices is called independent if the vertices in V 0 do not share any edges; if V can be partitioned into d independent subsets, V D [dkD1 Vk , then V is called d -partite. Let Hd jn be a complete dˇ-partite n-uniform hypergraph, where each independent ˇ set Vk has n vertices. Then ˇV.Hd jn /ˇ D n d , and the total number of hyperedges is equal to nd . A perfect matching on Hd jn is formed by a set of n hyperedges that do not share any vertices: ˇ ˚ D fe1 ; : : : ; en g ˇ ei 2 E; ei \ ej D ;; i; j 2 f1; : : : ; ng; i ¤ j : Figure 2 shows a perfect matching in a 3-partite 3-uniform hypergraph. If the cost of hypergraph matching is given by function ˚./, the general combinatorial optimization problem on hypergraph matchings can be stated as ˇ n o ˇ min ˚./ ˇ 2 M.Hd jn / ;

(4)

where M.Hd jn / is the set of all perfect matchings on Hd jn . The mathematical programming formulation of the hypergraph matching problem (4) is also generally known as multidimensional assignment problem (MAP). To derive the mathematical programming formulation of (4), note that according to the definition of Hd jn , each of its hyperedges contains exactly one vertex from each of the independent sets V1 ; : : : ; Vd and therefore can be represented as a vector .i1 ; : : : ; id / 2 f1; : : : ; ngd , where, with abuse of notation, the set f1; : : : ; ng is used to label the nodes of each independent subset Vk . Then, the set M.Hd jn / of perfect matchings on Hd jn can be represented in a mathematical programming form as

228

M. Mirghorbani et al.

( M.Hd jn / D

x 2 f0; 1g

nd

ˇ ˇ ˇ ˇ ˇ

X

xi1 id D 1; ir 2 f1; : : : ; ng;

ik 2f1;:::;ng k2f1;:::;d gnfrg

)

r 2 f1; : : : ; d g ;

(5)

where xi1 id D 1 if the hyperedge .i1 ; : : : ; id / is included in the matching, and xi1 id D 0 otherwise. Depending on the particular form of ˚, a number of combinatorial optimization problems on hypergraph matchings can be formulated. For instance, if the cost function ˚ in (4) is defined as a linear form over the variables xi1 id , n P

˚.x/ D

n P

i1 D1

id D1

i1 id xi1 id ;

(6)

one obtains the so-called linear multidimensional assignment problem (LMAP): D Zd;n

min x2f0;1gn

s. t.

n X d

n X

i1 D1

id D1

n X

n X

i2 D1 n X

i1 D1

xi1 id D 1;

i1 D 1; : : : ; n;

id D1

i1 D1 n X

i1 id xi1 id

n X

n X

ik1 D1 ikC1 D1

n X

xi1 id D 1;

ik D 1; : : : ; n;

id D1

k D 2; : : : ; d 1;

n X

xi1 id D 1;

id D 1; : : : ; n:

(7)

id 1 D1

Clearly, a special case of (7) with d D 2 is nothing else but the classical LAP (1). The dimensionality parameter d in (7) stands for the number of “dimensions” of the problem, or sets of elements that need to be assigned to each other, while the parameter n is known as the cardinality parameter. If the cost of the matching on hypergraph Hd jn is defined as the cost of the most expensive hyperedge in the matching, i.e., the cost function ˚.x/ has the form ˚.x/ D

max

i1 ;:::;id 2f1;:::;ng

i1 id xi1 id ;

we obtain the multidimensional assignment problem with bottleneck objective (BMAP):

Computational Studies of Randomized Multidimensional Assignment Problems Wd;n D

min x2f0;1gn

s. t.

d

max

i1 ;:::;id 2f1;:::;ng n X

i2 D1 n X

i1 id xi1 id

xi1 id D 1;

i1 D 1; : : : ; n;

id D1 n X

i1 D1 n X

n X

229

n X

ik1 D1 ikC1 D1 n X

i1 D1

n X

xi1 id D 1;

ik D 1; : : : ; n;

id D1

k D 2; : : : ; d 1; xi1 id D 1;

id D 1; : : : ; n:

(8)

id 1 D1

Similarly, taking the hypergraph matching cost function ˚ in (4) as a quadratic form d over x 2 f0; 1gn , ˚.x/ D

n P i1 D1

n n P P id D1 j1 D1

n P jd D1

i1 id j1 jd xi1 id xj1 jd ;

(9)

we arrive at the quadratic multidimensional assignment problem (QMAP), which represents a higher-dimensional generalization of the classical QAP. The LMAP was first introduced by Pierskalla [12], and has found applications in the areas of data association, sensor fusion, multisensor multi-target tracking, peer-to-peer refueling of space satellites, etc. for a detailed discussion of the applications of the LMAP, see, e.g., [3, 4]. In [2], a two-step method based on bipartite and multidimensional matching problem is proposed to solve the roots of a system of polynomial equations that avoid possible degeneracies and multiple roots encountered in some conventional methods. MAP is used in the course timetabling problem, where the goal is to assign students and teachers to classes and time slots [5]. In [1] a composite neighborhood structure with a randomized iterative improvement algorithm for the timetabling problem with a set of hard and soft constraints is proposed. An application of MAP in the scheduling of sport competitions that take place in different venues is studied in [15]. The characteristic of this study is that venues, that can involve playing fields, courts, or drill stations, are considered as part of the scheduling process. In [13] a Lagrangian relaxation based algorithm is proposed for the multi-target/multisensor tracking problem, where multiple sensors are used to identify targets and estimate their states. To accurately achieve this goal, the data association problem which is an NP-hard problem should be solved to partition observations into tracks and false alarms. A general class of these data association problems can be formulated as a multidimensional assignment problem with a Bayesian estimation as the objective function. The optimal solution yields the maximum a posteriori estimate. A special case of multiple-target tracking problem is studied in [14] to track the flight paths of charged elementary particles near to their primary point of interaction. The three-dimensional assignment problem is used in [6] to formulate a peer-to-peer

230

M. Mirghorbani et al.

(P2P) satellite refueling problem. P2P strategy is an alternative to the single vehicle refueling system where all satellites share the responsibility of refueling each other on an equal footing. The remainder of this chapter is organized as follows: In Sect. 2, heuristic methods to solve multidimensional assignment problems will be provided. Section 2.1 describes the method to solve MAPs with large cardinality. In Sect. 2.2, the heuristic method for MAPs with large dimensionality is explained. Section 3 contains the numerical results and comparison with exact methods, and finally in Sect. 4, conclusions and future extensions are provided.

2 High-quality Solution Sets in Randomized Multidimensional Assignment Problems In this section two methods will be described that can be used to obtain mathematically proven high-quality solutions for MAPs with large cardinality or large dimensionality. These methods utilize the concept of index graph of the underlying hypergraph of the problem.

2.1 Random Linear MAPs of Large Cardinality In the case when the cost ˚ of hypergraph matching is a linear function of hyperedges’ costs, i.e., for MAPs with linear objectives, a useful tool for constructing high-quality solutions for instances with large cardinality (n 1) is the so-called index graph. The index graph is related to the concept of line graph in that the vertices of the index graph represent the hyperedges of the hypergraph. Namely, by indexing each vertex of the index graph G D .V ; E / by .i1 ; : : : ; id / 2 f1; : : : ; ngd , identically to the corresponding hyperedge of Hd jn , the set of vertices V can be partitioned into n subsets Vk , also called levels, which contain vertices whose first index is equal to k: V D

n [

Vk ;

ˇ Vk D f.k; i2 ; : : : ; id / ˇ i2 ; : : : ; id 2 f1; : : : ; ngg:

kD1

For any two vertices i; j 2 V , an edge .i; j / exists in G , .i; j / 2 E , if and only if the corresponding hyperedges of Hd jn do not have common nodes (Fig. 3). In other words, ˇ E D f.i; j / ˇ i D .i1 ; : : : ; id /; j D .j1 ; : : : ; id / W ik ¤ jk ; k D 1; : : : ; ng: Then, that it is easy to see that G has the following properties.

Computational Studies of Randomized Multidimensional Assignment Problems

231

Fig. 3 The index graph G of the hypergraph Hd jn shown in Fig. 2. The vertices of G shaded in gray represent a clique (or, equivalently, a perfect matching on Hd jn )

Lemma 1. Consider a complete, d -partite, n-uniform hypergraph Hd jn D .V; E/, S where jEj D nd , and V D dkD1 Vk such that Vk \ Vl D ;, k ¤ l, and jVk j D n, k D 1; : : : ; d . Then, the index graph G D .V ; E / of Hd jn satisfies: S 1. G is n-partite, namely V D nkD1 Vk , Vi \ Vj D ; for i ¤ j , where each Vk is an independent set in V : for any i; j 2 Vk one has .i; j / … E . 2. jVk j D nd 1 for each k D 1; : : : ; n. 3. The set of perfect matchings in Hd jn is isomorphic to the set of n-cliques in G , i.e., each perfect matching in Hd jn corresponds uniquely to a (maximum) clique of size n in G . Let us denote by G .˛n / the induced subgraph of the index graph G obtained by randomly selecting ˛n vertices from each level Vk of G , and also define N.˛n / to be the number of cliques in G .˛n /, then based on the following lemma [9] one can select ˛n in such a way that G .˛n / is expected to contain at least one n-clique: Lemma 2. The subgraph G .˛n / is expected to contain at least one n-clique, or a perfect matching on Hd jn (i.e., EŒN.˛n / 1) when ˛n is equal to ˛n D

nd 1 nŠ

d 1 n

:

(10)

In the case when the cost coefficients i1 id of MAP with linear or bottleneck objective are drawn independently from a given probability distribution, Lemma 2 can be used to construct high-quality solutions. The approach is to create the subgraph Gmin .˛n /, also called the ˛-set, from the index graph G of the MAP by selecting ˛n nodes with the smallest cost coefficients from each partition (level) of G . If the costs of the hyperedges of Hd jn , or, equivalently, vertices of G , are identically and independently distributed, the ˛-set is expected to contain at least one clique, which represents a perfect matching in the hypergraph Hd jn (Fig. 2). It should be noted that since the ˛-set is created from the nodes with the smallest cost coefficients, if a clique exists in the ˛-set, the resulting cost of the perfect matching is expected to be close to the optimal solution of the MAP.

232

M. Mirghorbani et al.

Importantly, when the cardinality n of the MAP increases, the size of the subgraph G .˛n / or Gmin .˛n / grows only as O.n/, as evidenced by the following observation: Lemma 3. If d is fixed and n ! 1, then ˛n monotonically approaches a finite limit: ˛n % ˛ WD de d 1 e as n % 1: (11) Corollary 1. In the case of randomized MAP of large enough cardinality n 1 expected to contain a high-quality feasible solution of the MAP can the subset Gmin simply be chosen as Gmin .˛/, where ˛ is given by (11). Observe that using the ˛-set Gmin .˛/ for construction of a low-cost feasible solution to randomized MAP with linear or bottleneck objectives may prove to be a challenging task, since it is equivalent to finding an n-clique in an n-partite graph; moreover, the graph Gmin .˛/ is only expected to contain a single n-clique (feasible solution). The following variation of Lemma 2 allows for constructing a subgraph of G that contains exponentially many feasible solutions:

Lemma 4. Consider the index graph G of the underlying hypergraph Hd jn of a randomized MAP, and let d 1 n ˇn D 2 d 1 : (12) nŠ n Then, the subgraph G .ˇn / is expected to contain 2n n-cliques, or, equivalently, perfect matching on Hd jn . Proof. The statement of the lemma is easy to obtain by regarding the feasible solutions of the MAP as paths that contain exactly one vertex in each of the n G . Namely, “levels” V1 ; : : : ; Vn of the index graph let us call apath connectingthe

2 V1 , 2; i2 ; : : : ; id 2 V2 , . . . , n; i2 ; : : : ; id 2 vertices 1; i2 ; : : : ; id o n .1/ .2/ .n/ Vn feasible if ik ; ik ; : : : ; ik is a permutation of the set f1; : : : ; ng for every k D 2; : : : ; d . Note that from the definition of the index graph G it follows that a path is feasible if and only if the vertices it connects form an n-clique in G . Next, observe that a path in G chosen at random is feasible with the probability nŠ d 1 , since one can construct nn.d 1/ different (not necessarily feasible) paths in nn G . Then, if we randomly select ˇn vertices from each set Vk in such a way that out of the .ˇn /n paths spanned by G .ˇn / at least 2n are feasible, the value of ˇn must satisfy: d 1 nŠ n 2n ; .ˇn / nn .1/

.1/

.2/

.2/

.n/

.n/

from which it follows immediately that ˇn must satisfy (12). Corollary 2. If d is fixed and n ! 1, then ˇn monotonically approaches a finite limit: ˇn % ˇ WD d2e d 1 e as n % 1:

Computational Studies of Randomized Multidimensional Assignment Problems

233

Remark 1. Since the value of the parameter ˇn (12) is close to the double of the parameter ˛n (10), the subgraph Gmin .ˇn /, constructed from selecting ˇn nodes with the smallest cost coefficients from each partition (level) of G will be called the “2˛-set,” or G .2˛/. Following [10], the costs of feasible solutions of randomized MAPs with linear or bottleneck objectives that are contained in the ˛- or 2˛-sets can be shown to satisfy: Lemma 5. Consider a randomized MAP with linear or bottleneck objectives, whose cost coefficients are iid random variables from a continuous distribution F with a finite left endpoint of the support, F 1 .0/ > 1. Then, for a fixed d 3 and large enough values of n, if the subset Gmin .˛/ (or, respectively, Gmin .ˇ/) contains a feasible solution of the MAP, the cost Zn of this solution satisfies .n 1/F 1 .0/ C F 1

1 nd 1

Zn nF 1

3 ln n ; nd 1

n 1;

(13)

in the case of MAP with linear objective (7), while in the case of MAP with bottleneck objective (8) the cost Wn of such a solution satisfies F

1

1 nd 1

Wn F

1

3 ln n ; nd 1

n 1:

(14)

2.2 Random MAPs of Large Dimensionality In cases where the cardinality of the MAP is fixed, and its dimensionality is large, d 1, the approach described in Sect. 2.1 based on the construction of ˛- or 2˛subset of the index graph G of the MAP is not well suited, since in this case the size of G .˛/ grows exponentially in d . However, the index graph G of the underlying hypergraph Hd jn of the MAP can still be utilized to construct high-quality solutions of large-dimensionality randomized MAPs. n o .1/ .1/ .n/ .n/ Let us call two matchings i D i1 ; : : : ; id ; : : : ; i1 ; : : : ; id and o n .1/ .1/ .n/ .n/ on the hypergraph Hd jn disjoint if j D j1 ; : : : ; jd ; : : : ; j1 ; : : : ; jd .k/ .k/ .`/ .`/ ¤ j1 ; : : : ; jd i1 ; : : : ; id

for all 1 k; ` n;

or, in other words, if i and j do not have any common hyperedges. It is easy to see that if the cost coefficients of randomized MAPs are iid random variables, then the costs of the feasible solutions corresponding to the disjoint matchings are also independent and identically distributed.

234

M. Mirghorbani et al.

Next, we show how the index graph G of the MAP can be used to construct exactly nd 1 disjoint solutions whose costs are iid random variables. First, recalling the interpretation of feasible MAP solutions as paths in the index graph G , we observe that disjoint solutions of MAP, or, equivalently, disjoint matchings on Hd jn are represented by disjoint paths in G that do not have common vertices. Note that since each level Vk of G contains exactly nd 1 vertices (see Lemma 1), there may be no set of disjoint paths with more than nd 1 elements. On the other hand, recall that a (feasible) path G can be described as a set of n vectors o n .1/

.1/

.n/

.n/

; D i1 ; : : : ; id ; : : : ; i1 ; : : : ; id n o .1/ .n/ such that ik ; : : : ; ik is a permutation of the set f1; : : : ; ng for each k D 1; : : : ; d . .1/ .1/ Then, for any given vertex v.1/ D 1; i2 ; : : : ; id 2 V1 , let us construct a feasible path containing v.1/ in the form o n .1/ .1/ .2/ .2/ .n/ .n/ ; 1; i2 ; : : : ; id ; 2; i2 ; : : : ; id ; : : : ; n; i2 id where for k D 2; : : : ; d and r D 2; : : : ; n ( .r/ ik

n In other words,

D

.1/

.r1/

ik

.r1/

C 1; if ik 1; if

.n/

ik ; : : : ; ik

.r1/ ik

D 1; : : : ; n 1; D n:

(15)

o is a forward cyclic permutation of the set

d 1 f1; vertices k D 2; : : : ; d . Applying (15) to each of the n : : : ; ng for any .1/ .1/ d 1 2 V1 , we obtain n feasible paths (matchings on Hd jn ) that 1; i2 ; : : : ; id are mutuallydisjoint, since (15) defines a bijective mapping between any vertex .k/ .k/ (hyperedge) k; i2 ; : : : ; id from the set Vk , k D 2; : : : ; n, and the corresponding

vertex (hyperedge) v.1/ 2 V1 . Then, if hyperedge costs i1 id in the linear or bottleneck MAPs (7) and (8) are stochastically independent, the costs ˚.1 /; : : : ; ˚.nd 1 / of the nd 1 disjoint matchings 1 ; : : : ; nd 1 defined by (15) are also independent, as they do not contain any common elements i1 id . Given that the optimal solution cost Zd;n (respectively, Wd;n ) of randomized linear (respectively, bottleneck) MAP does not exceed the costs ˚.1 /,. . . , ˚.nd 1 / of the disjoint solutions described by (15), the following bound on the optimal cost of linear or bottleneck randomized MAP can be established. , Wd;n of random MAPs with linear or bottleneck Lemma 6. The optimal costs Zd;n objectives (7), (8), where cost coefficients are iid random variables, satisfy P

Zd;n X1Wnd 1 ;

max Wd;n X1Wn d 1 ;

(16)

Computational Studies of Randomized Multidimensional Assignment Problems

235

P

where Xi , Ximax .i D 1; : : : ; nd 1 / are iid random variables with distributions P ;max F that are determined by the form of the corresponding objective function, and X1Wk denotes the minimum-order statistic among k iid random variables. Remark 2. Inequalities in (16) are tight: namely, in the special case of random MAPs with n D 2, all of the nŠd 1 D 2d 1 feasible solutions are stochastically independent [7], whereby equalities hold in (16). As shown in [10], the following quality guarantee on the minimum cost of the nd 1 disjoint solutions (15) of linear and bottleneck MAPs can be established: d 1 P X1Wnd 1 nF 1 n 2n ;

d 1 max 1 X1Wn n 2n ; d 1 F

d 1;

where F 1 is the inverse of the distribution function F of the cost coefficients i1 id . This observation allows for constructing high-quality solutions of randomized linear and bottleneck MAPs by searching the set of disjoint feasible solutions as defined by (15).

3 Numerical Results Sections 2.1 and 2.2 introduced two methods of solving randomized instances of MAPs by constructing subsets (neighborhoods) of the feasible set of the problem that are guaranteed to contain high-quality solutions whose costs approach optimality when the problem size (n ! 1, or, respectively, d ! 1) increases. In this section we investigate the quality of solutions contained in these neighborhoods for small- to moderate-sized problem instances and compare the results with the optimal solutions where it is possible. Before proceeding with the numerical results of the study, in the next section, FINDCLIQUE, the algorithm that is used to find the optimum clique in the indexgraph G or the first clique in the ˛-set or 2˛-set will be described. The results from randomly generated MAP instances for each of these two methods are presented next.

3.1 Finding n-Cliques in n-Partite Graphs In order to find cliques in G , the ˛-set, or the 2˛-set, the branch-and-bound algorithm proposed in [8] is used. This algorithm, called FINDCLIQUE, is designed to find all n-cliques contained in an unweighed n-partite graph. The input to original FINDCLIQUE is an n-partite graph G.V1 ; : : : ; Vn I E/ with the adjacency matrix M D .mij /, and the output will be a list of all n-cliques

236

M. Mirghorbani et al.

contained in G. Nodes from G are copied into a set called compatible nodes, denoted by C . The set C is further divided into n partitions, each denoted by Ci that are initialized such that they contain nodes from partite Vi , i D f1; : : : ; ng. FINDCLIQUE also maintains two other sets, namely, current clique, denoted by Q and erased nodes, denoted by E. The set Q holds a set of nodes that are pairwise adjacent and construct a clique. The erased node set, E, is furthered partitioned into n sets, denoted by Ei , that are initialized as empty. At each step of the algorithm, Ei will contain the nodes that are not adjacent to the i th node added to Q. The branch-and-bound tree has n levels, and FINDCLIQUE searches for ncliques in the tree in a depth-first fashion. At level t of the branch ˇ of bound algorithm, the index of the smallest partition in C , D arg minfjCi j ˇi … Vg will i

be detected, and C will be marked as visited by including into V fV [ g, where V is the list of partitions that have a node in Q. Then, a node q from C is selected at random and added to Q. If jQj D n, an n-clique is found. Otherwise, C will be updated; every partition Ci where i … V will be searched for nodes cij , .j D 1; : : : ; jCi j/ that are not adjacent to q, i.e., mq;cij D 0. Any such node will be removed from Ci and will be transferred to Et . Note that in contrast to C , nodes in different levels of E will not necessarily be from the same partite of G. Decision regarding backtracking is made after C is updated. It is obvious that in an n-partite graph the following will hold: !.G/ n;

(17)

where !.G/ is the size of a maximum clique in G. In other words, the size of any maximum clique cannot be larger than the number of partites in that the maximum clique can only contain at most one node from each partite of G. If after updating, there is any Ci … V with jCi j D 0, adding qi to Q will not result in a clique of size n, since the condition in (17) changes into strict inequality. In such cases, q is removed from Q, nodes from Et will be transferred back to their respective partitions in C , and FINDCLIQUE will try to add another node from C that is not already branched on, to Q. If such a node does not exist, the list of visited partitions will be updated (V Vn), and FINDCLIQUE backtracks to the previous level of the branch-and-bound tree. If the backtracking condition is not met and q is promising, FINDCLIQUE will go one level deeper in the tree, finds the next smallest partition in the updated C and tries to add a new node to Q. When solving the clique problem in the ˛-set or 2˛-set, since the objective is to find the first n-clique regardless of its cost, FINDCLIQUE can be used without any modifications, and the weights of the nodes in Gmin .˛/ or Gmin .2˛/ will be ignored. However, when the optimal clique with the smallest cost in G is sought, some modifications in FINDCLIQUE are necessary to enable it to deal with weighted graphs. The simplest way to adjust FINDCLIQUE is to compute the weight of the n-cliques as they are found, and report the clique with the smallest cost as the output of the algorithm. This is the method that is used in the experimental studies whenever the optimal solution is desired. However, to obtain a more efficient

Computational Studies of Randomized Multidimensional Assignment Problems

237

algorithm, it is possible to calculate the weight of the partial clique contained in Q in every step of the algorithm and fathom subproblems for which WQ WQ , where WQ and WQ are the cost of the partial clique in Q and the cost of the best clique found so far by the algorithm, respectively. Further improvement can be achieved by sorting the nodes in Ci , i D 1; : : : ; n, based on their cost coefficients, and each time select the untraversed node with the smallest node as the next node to be added to Q (as opposed to randomly selecting a node, which does not change the overall computational time in the unweighted graph if a list of all n-cliques is desired). This enables us to compute a lower bound on the cost of the maximum clique that the nodes in Q may lead to as follows: LBQ D WQ C

X

wmin i ;

(18)

i …V

where wmin is the weight of the node with the smallest cost coefficient in Ci . Any i subproblem with LBQ WQ will be fathomed.

3.2 Random Linear MAPs of Large Cardinality To demonstrate the performance of the method described in Sect. 2.1, random MAPs with fixed dimensionality d D 3 and different values of cardinality n are generated. The cost coefficients i1 id are randomly drawn from the uniform U Œ0; 1 distribution. Three sets of problems are solved for this case: (i) n D 3; : : : ; 8 with d D 3, solved for optimality, and the first clique in the ˛- and 2˛-sets, (ii) n D 10; 15; : : : ; 45, with d D 3, solved for the first clique in the ˛- and 2˛-sets, and finally (iii) n D 50; 55; : : : ; 80, with d D 3, solved for the first clique in the 2˛-set. For each value of n, 25 instances are generated and solved by modified FINDCLIQUE for the optimum clique or FINDCLIQUE whenever the first clique in the problem is desired. Algorithm is terminated if the computational time needed to solve an instance exceeds 1 h. In the first group, (i), instances of MAP that admit solution to optimality in a reasonable time were solved. The results from this subset are used to determine the applicability of Corollary 1 and bounds (13) and (14) for relatively small values of n. Table 1 summarizes the average values for the cost of the clique and computational time needed for MAPs with the linear sum objective function for the instances in group (i). The first column, n, is the cardinality of the problem. The columns under the heading “Exact” contain the values related to the optimal clique in G . The columns under the heading “Gmin .˛n /” represent the values obtained from solving the ˛-set for the first clique, and those under the heading “Gmin .2˛/” represent the values obtained from solving the 2˛-set for the first clique. For each of these multicolumns, T denotes the average computational time in seconds, Z is the average cost of the cliques, jV j is the order of the graph or induced subgraph in

238

M. Mirghorbani et al.

Table 1 Comparison of the computational time and cost for the optimum clique and the first clique found in G .˛/ and G .2˛/ in random MAPs with linear sum objective functions for instances in group (i) Exact Gmin .˛/ Gmin .2˛/ n Tn;3 Zn;3 jV j 9 CLQ TGmin .˛/ ZGmin .˛/ jV j 9 CLQ TGmin .2˛/ ZGmin .2˛/ jV j 9 CLQ 3 0.02 0.604 4 0.01 0.458 5 0.02 0.371 6 0.31 0.374 7 14.83 0.329 8 937.67 0.274

326 463 5124 6215 7342 8511

100 100 100 100 100 100

0.04 0.03 0.04 0.04 0.04 0.05

0.609 0.514 0.399 0.452 0.392 0.329

33 44 54 65 75 85

76 88 72 92 80 72

0.03 0.03 0.03 0.01 0.05 0.04

0.773 0.635 0.571 0.524 0.47 0.478

36 47 58 69 79 810

100 100 100 100 100 100

Table 2 Comparison of the computational time and cost for the optimum clique and the first clique found in G .˛/ and G .2˛/ in random MAPs with linear bottleneck objective functions for instances in group (i) Exact Gmin .˛/ Gmin .2˛/ n Tn;3 Wn;3 jV j 9 CLQ TGmin .˛/ WGmin .˛/ jV j 9 CLQ TGmin .2˛/ WGmin .2˛/ jV j 9 CLQ 3 0.01 0.321 4 0.01 0.205 5 0.01 0.151 6 0.3 0.124 7 14.96 0.098 8 956.6 0.075

326 463 5124 6215 7342 8511

100 100 100 100 100 100

0.03 0.03 0.02 0.04 0.04 0.04

0.324 0.241 0.17 0.166 0.131 0.092

33 44 54 65 75 85

76 88 72 92 80 72

0.04 0.03 0.03 0.04 0.04 0.04

0.439 0.311 0.27 0.219 0.163 0.157

36 47 58 69 79 810

100 100 100 100 100 100

G , Gmin .˛/, or Gmin .2˛/, and 9 CLQ shows the percentage of the problems for which the ˛-set or 2˛-set, respectively, contains a clique. This value is 100% for the exact method. There was no instances in group (i) for which the computational time exceeded 1 h. It is clear that using ˛-set or 2˛-set enables us to obtain a high-quality solution in a much shorter time by merely searching a significantly smaller part of the index graph G . Based on the values for Z, the cost of the clique found in ˛-set or 2˛set are consistently converging to that of the optimal clique and they provide tight upper bounds for the optimum cost. Additionally, as is shown in the jV j column, significant reduction in the size of the graph can be obtained if ˛-set or 2˛-set are used. Table 2 contains the corresponding results for the case of a random MAP with bottleneck objective. In this table, W represents the value for the cost of the optimal clique or the first clique found in ˛- or 2˛-set. Figure 4(a) shows how the cost of an optimum clique compares to the cost of the clique found in ˛-set and 2˛set. Clearly, the cost of optimal clique approaches 0 for both linear sum and linear bottleneck MAPs. Figure 4(b) demonstrates the computational time for instances in group (i). The advantage of using ˛-set over 2˛-set is that the quality of the detected clique is expected to be higher. On average, however, a clique in 2˛-set is found in a shorter time than in ˛-set.

Computational Studies of Randomized Multidimensional Assignment Problems

239

Fig. 4 Solution costs (a) and computational time (b) in random MAPs with linear sum and linear bottleneck objective functions for instances in group (i) Table 3 Comparison of the computational time and cost for the first clique found in G .˛/ and G .2˛/ in random MAPs with linear sum objective functions for instances in group (ii) Gmin .˛/

n TGmin .˛/ 10 0.05 15 0.06 20 0.08 25 0.15 30 0.89 35 8.54 40 100.85 45 405.16

Gmin .2˛/

ZGmin .˛/ 0.266 0.228 0.165 0.147 0.134 0.11 0.097 0.085

jV j 105 156 206 257 307 357 407 457

9 CLQ 60 76 56 80 92 88 92 80

Timeout 16

TGmin .2˛/ 0.05 0.06 0.07 0.08 0.09 0.14 0.46 1.09

ZGmin .2˛/ 0.37 0.313 0.246 0.2 0.171 0.151 0.131 0.122

jV j 1010 1511 2012 2513 3013 3513 4013 4514

9 CLQ 100 100 100 100 100 100 100 100

Timeout -

The second group of problems, (ii), comprises instances that cannot be solved to optimality within 1 h. The range of n for this group is such that the first clique in the ˛-set is expected to be found within 1 h. Tables 3 and 4 summarize the results obtained for this group. Instances with n D 45 were the largest problems in this group for which ˛-set could be solved within 1 h. As it is expected, the 2˛-set can be solved quickly in a matter of seconds where the equivalent problem for ˛-set requires a significantly longer computational time. However, the quality of the solutions found for ˛-set is higher than the quality for solutions in 2˛set. Nonetheless, using 2˛-set increases the odds of finding a clique, as based on Lemma 4, 2˛-set is expected to contain an exponential number of cliques. It is obvious from the 9 CLQ column that not all of the instances in ˛-set contain at least a clique, whereas 100% of the instances in 2˛-set contain one that can be found within 1 h. Column Timeout represents the percentage of the problems that could not be solved within the allocated 1 h time limit. Out of 25 instances solved for

240

M. Mirghorbani et al.

Table 4 Comparison of the computational time and cost for the first clique found in G .˛/ and G .2˛/ in random MAPs with linear bottleneck objective functions for instances in group (ii) Gmin .˛/ Gmin .2˛/ n TGmin .˛/ WGmin .˛/ jV j 9 CLQ Timeout TGmin .2˛/ WGmin .2˛/ jV j 9 CLQ Timeout 10 0.04 0.065 105 60 0.02 0.098 1010 100 15 0.04 0.037 156 76 0.02 0.056 1511 100 20 0.05 0.023 206 56 0.04 0.036 2012 100 25 0.1 0.017 257 80 0.08 0.025 2513 100 30 0.87 0.012 307 92 0.1 0.019 3013 100 35 8.53 0.009 357 88 0.15 0.015 3513 100 40 100.99 0.007 407 92 0.46 0.011 4013 100 45 403.52 0.006 457 80 16 1.09 0.009 4514 100 -

Fig. 5 Comparison of the cost (a) and computational time (b) for MAPs with linear sum and linear bottleneck objective functions for group (ii) and (iii)

n D 45, only 4 (16%) could not be solved in 1 h. Out of the 21 remaining instances, 20 instances contained a clique, and only 1 did not have a clique. The behavior of the average cost values for the problems solved in this group are depicted in Fig. 5. Finally, the third group, (iii), includes instances for which the cardinality of the problem prevents the ˛-set from being solved within 1 h. Thus, for this set, only the 2˛-set is used. The instances of this group were solved with the parameter values n D 50; 55; : : : ; 80 and d D 3. Tables 5 and 6 summarize the corresponding results. When the size of the problem n 55, some instances of problems become impossible to solve within 1 h time limit. The average cost for the instances that are solved keeps the usual trend and converges to 0 as n grows. The largest problems attempted to be solved in this group are MAPs with n D 80. Out of 25 instances of this size, only four could be solved within 1 h. Figure 5(a) the average values of solution cost and computational time for the instances of both linear sum and linear bottleneck MAPs. Note that as the size of the problem increases, the reduction in the size of problem achieved from using ˛-set or 2˛-set becomes significantly larger.

Computational Studies of Randomized Multidimensional Assignment Problems Table 5 Computational time and cost for the first clique found in G .2˛/ in random MAPs with linear sum objective functions for instances in group (iii)

Table 6 Computational time and cost for the first clique found in G .2˛/ in random MAPs with linear bottleneck objective functions for instances in group (iii)

241

Gmin .2˛/

n

TGmin .2˛/

ZGmin .2˛/

jV j

9 CLQ

Timeout

50 55 60 65 70 75 80

1:56 52:29 189:9 568:9 919:79 1556:89 1641:26

0:11 0:099 0:091 0:085 0:078 0:075 0:07

5014 5514 6014 6514 7014 7514 8014

100 96 92 96 64 40 16

4 8 4 36 60 84

Gmin .2˛/

n

TGmin .2˛/

WGmin .2˛/

jV j

9 CLQ

Timeout

50 55 60 65 70 75 80

1:56 52:19 190:6 566:71 920:44 1552:74 1631:89

0.008 0.006 0.005 0.005 0.004 0.004 0.003

5014 5514 6014 6514 7014 7514 8014

100 96 92 96 64 40 16

4 8 4 36 60 84

For instance, in MAP with n D 80 and d D 3, the 2˛-set has 80 14 nodes, while the complete index graph will have 80 802 nodes.

3.3 Random MAPs of Large Dimensionality The second set of problem instances includes MAPs that are solved by the heuristic method explained in Sect. 2.2. Problems in this set have the cardinality n D 2; : : : ; 5 and dimensionality in the range d D 2; : : : ; dNn , where dNn is the largest value for d for which an MAP with cardinality n can be solved within 1 h using the heuristic method. For each pair of .n; d /, 25 instances of MAP with cost coefficients randomly drawn from the uniform U Œ0; 1 distribution are generated. Generated instances are then solved by the modified FINDCLIQUE for the optimal clique (when possible) and the optimal costs are compared with the costs obtained from the heuristic method. The result of the heuristic method for instances with n D 2 is optimal, and the heuristic checks all the 2d 1 solutions of the MAP. Thus, using the modified FINDCLIQUE to find the optimum clique is not necessary. Figure 6 demonstrates the cost convergence in instances with n D 2; 3; 4; 5 for both linear sum and linear bottleneck MAPs. Figure 6(a) demonstrates the cost convergence in MAPs with n D 2 and d D 2; : : : ; 27. Recall that due to Remark 2, for cases with n D 2 the heuristic provides the optimal solution. The heuristic method provides high-quality solutions that are consistently converging to

242

M. Mirghorbani et al.

Fig. 6 Comparison of the cost obtained from the heuristic method with the optimum cost in MAPs with linear sum and linear bottleneck objective functions with (a) n D 2, (b) n D 3, (c) n D 4, and (d) n D 5

the optimal solution for all cases and the average value of the obtained costs from the heuristics approaches 0. Memory limitations, as opposed to computational time, were the restrictive factor for solving larger instances as the computational time for the problems of this set never exceeded 700 s. Figure 7 demonstrates the computational time for the optimal method as well as the heuristic method in instances with n D 2; 3; 4; 5 for both linear sum and linear bottleneck MAPs. The computational time has an exponential trend as the number of solutions for the MAP, or the number of solutions checked by the heuristic grow in an exponential manner. However, the heuristic method is able to find high-quality solutions in significantly shorter time.

Computational Studies of Randomized Multidimensional Assignment Problems

243

Fig. 7 Comparison of the computational time in logarithmic scale needed for the optimal method and the heuristic method in MAPs with linear sum and linear bottleneck objective functions with (a) n D 2, (b) n D 3, (d) n D 4, and (d) n D 5

4 Conclusions In this paper, randomized MAPs that correspond to hypergraph matching problems were studied. Two different methods were provided to obtain guaranteed highquality solutions for MAPs with linear sum or linear bottleneck cost function and fixed dimensionality and fixed cardinality. The computational results demonstrated that the proposed methods provide a tight upper bound on the value of the optimal cost for MAPs in randomized problems. With the first method, problem instances with d D 3 and n as large as 80 are solved. The heuristic provided for problems with fixed cardinality can provide high-quality solutions to problems with large dimensionality in a relatively short time. The limiting factor for the heuristic method is the memory consumption. The structure of the proposed methods makes them suitable for parallel computing. As an extension, the performance of the proposed heuristic in a parallel system will be studied.

244

M. Mirghorbani et al.

References 1. Abdullah, S., Burke, E.K., Mccollum, B.: Using a randomised iterative improvement algorithm with composite neigjhbourhood structures for university course timetabling. In: The Proceedings of the 6th Metaheuristic International Conference [MIC05, pp. 22–26. Book (2005) 2. Bekker, H., Braad, E.P., Goldengorin, B.: Using bipartite and multidimensional matching to select the roots of a system of polynomial equations. In: ICCSA (4), pp. 397–406 (2005) 3. Burkard, R.E.: Selected topics on assignment problems. Discrete Appl. Math. 123(1–3), 257–302 (2002) 4. Burkard, R.E., C ¸ ela, E.: Linear assignment problems and extensions. In: Du, D.-Z., Pardalos, P.M. (eds.) Handbook of Combinatorial Optimization, Supplement Volume A, pp. 75–149. Kluwer Academic Publishers, Dordrecht, (1999) 5. Carter, M.W., Laporte, G.: Recent developments in practical course timetabling. In: Burke, E., Carter, M. (eds.) Practice And Theory Of Automated Timetabling Ii, 2nd International Conference on the Practice and Theory of Automated Timetabling (Patat 97), Toronto, Canada, 20–22 Aug 1997. Lecture Notes In Computer Science, vol. 1408 , pp. 3–19. Springer-Verlag Berlin, Heidelberger Platz 3, D-14197 Berlin, Germany (1998) 6. Dutta, A., Tsiotras, P.: A greedy random adaptive search procedure for optimal scheduling of p2p satellite refueling. In: AAS/AIAA Space Flight Mechanics Meeting, pp. 07–150 (2007) 7. Grundel, D., Krokhmal, P., Oliveira, C., Pardalos, P.: On the number of local minima in the multidimensional assignment problem. J. Combin. Opt. 13(1), 1–18 (2007) 8. Gr¨unert, T., Irnich, S., Zimmermann, H., Schneider, M., Wulfhorst, B.: Finding all k-cliques in k-partite graphs, an application in textile engineering. Comput. Oper. Res. 29(1), 13–31 (2002) 9. Krokhmal, P., Grundel, D., Pardalos, P.: Asymptotic behavior of the expected optimal value of the multidimensional assignment problem. Mathem. Prog. 109(2–3), 525–551 (2007) 10. Krokhmal, P.A., Pardalos, P.M.: Limiting optimal values and convergence rates in some combinatorial optimization problems on hypergraph matchings. Submitted for publication, 3131 Seamans Center, Iowa City, IA 52242, USA, (2011) 11. Kuhn, H.W.: The hungarian method for the assignment problem. Nav. Res. Logist. Quar. 2(1–2), 83–87 (1955) 12. Pierskalla, W.: The multidimensional assignment problem. Oper. Res. 16(2), 422–431 (1968) 13. Poore, A.B.: Multidimensional assignment formulation of data association problems arising from multitarget and multisensor tracking. Comput. Opt. Appl. 3(1), 27–54 (1994) 14. Pusztaszeri, J.F., Rensing, P.E., Liebling, T.M.: Tracking elementary particles near their primary vertex: A combinatorial approach. J. Global Optim. 9(1), 41–64 (1996) 3rd Workshop on Global Optimization, SZEGED, Hungary, Dec 1995. 15. Urban, T.L., Russell, R.A.: Scheduling sports competitions on multiple venues. European J. Oper. Res. 148(2), 302–311 (2003)

On Some Special Network Flow Problems: The Shortest Path Tour Problems Paola Festa

Abstract This paper describes and studies the shortest path tour problems, special network flow problems recently proposed in the literature that have originated from applications in combinatorial optimization problems with precedence constraints to be satisfied, but have found their way into numerous practical applications, such as for example in warehouse management and control in robot motion planning. Several new variants belonging to the shortest path tour problems family are considered and the relationship between them and special facility location problems is examined. Finally, future directions in shortest path tour problems research are discussed in the last section. Keywords Shortest path tour problems • Network flow problems • Combinatorial optimization

1 Introduction Shortest path tour problems (SPTPs) are special network flow problems recently proposed in the literature [14]. Given a weighted directed graph G, the classical SPTP consists of finding a shortest path from a given origin node to a given destination node in the graph G with the constraint that the optimal path should successively pass through at least T one node from given node mutually independent subsets T1 ; T2 ; : : : ; TN , where N kD1 Tk D ;. In more detail, P starts at the origin node (that without loss of generality can be assumed in T1 ), moves to some node in T2 (possibly through some intermediate nodes that are not in T2 ), then moves to some node in T3 (possibly through some intermediate nodes that are not in P. Festa () Department of Mathematics and Applications, University of Napoli FEDERICO II, Compl. MSA, Via Cintia, 80126 Napoli, Italy e-mail: [email protected] A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, 245 Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 13, © Springer Science+Business Media New York 2012

246

P. Festa

T3 , but may be in T1 and/or in T2 ), etc., then finally it moves to the destination node (possibly through some intermediate nodes not equal to the destination, which without loss of generality can be assumed in TN ). The SPTP and the idea behind it were given in 2005 as Exercise 2.9 in Bertsekas’s Dynamic Programming and Optimal Control book [3], where it is asked to formulate it as a dynamic programming problem. Very recently, in [14] it has been proved that the SPTP belongs to the complexity class P. This problem has several practical applications, such as, for example, in warehouse management or control of robot motions. In both cases, there are precedence constraints to be satisfied. In the first case, assume that an order arrives for a certain set of N collections of items stored in a warehouse. Then, a vehicle has to collect at least an item of each collection of the order to ship them to the costumers. In control of robot motions, assume that to manufacture workpieces, a robot has to perform at least one operation selected from a set of N types of operations. In this latter case, operations are associated with nodes of a directed graph and the time needed for a tool change is the distance between two nodes. The remainder of this article is organized as follows. In Sect. 2, the classical SPTP is described and its properties are analyzed. Exact techniques proposed in [14] are also surveyed along with the computational results obtained and analyzed in [14]. In Sect. 3, several new different variants of the classical SPTP are stated and formally described as special facility location problems. Concluding remarks and future directions in SPTPs research are discussed in the last section.

2 Notation and Problem Description Throughout this paper, the following notation and definitions will be used. Let G D .V; A; C / be a directed graph, where • V is a set of nodes, numbered 1; 2; : : : ; n. • A D f.i; j /j i; j 2 V g is a set of m arcs. • C WA! 7 RC [ f0g is a function that assigns a nonnegative length cij to each arc .i; j / 2 A. • For each node i 2 V , let F S.i / D fj 2 V j .i; j / 2 Ag and BS.i / D fj 2 V j .j; i / 2 Ag be the forward star and backward star of node i , respectively. • A simple path P D fi1 ; i2 ; : : : ; ik g is a walk without any repetition of nodes. • The length L.P / of any path P is defined as the sum of lengths of the arcs connecting consecutive nodes in the path. Then, the SPTP can be stated as follows: Definition 1. The SPTP consists of finding a shortest path from a given origin node s 2 V to a given destination node d 2 V in the graph G with the constraint that the optimal path P should successively T pass through at least one node from given node subsets T1 ; T2 ; : : : ; TN , where N kD1 Tk D ;.

On Some Special Network Flow Problems: The Shortest Path Tour Problems

2

1

5 1

2

Classical Shortest Path { (1,3), (3,7) }

5

1

s=1

3

247

3 4

3

d=7 2

1

4 4

6

Shortest Path Tour { (1,3), (3,2), (2,3), (3,7) }

Fig. 1 A SPTP instance on a small graph G

Let us consider the small graph G D .V; A; C / depicted in Fig. 1, where V D fs D 1; 2; : : : ; 7 D d g. It is easy to see that P D f1; 3; 7g is the shortest path from node 1 to node 7 and has length 5. Let us now define on the same small graph G the SPTP instance characterized by N D 4 and the following node subsets T1 D fs D 1g; T2 D f3g; T3 D f2; 4g; T4 D fd D 7g. The shortest path tour from node 1 to node 7 is the path PT D f1; 3; 2; 3; 7g which has length 11 and is not simple, since it passes twice through node 3. When dealing with any given optimization problem (such as SPTP), one is usually interested in classifying it according to its complexity in order to be able to design an algorithm that solves the problem of finding the best compromise between solution quality and computational time required to find that solution. In classifying a problem according to its complexity, polynomial-time reductions are helpful. In fact, deciding the complexity class of an optimization problem P r becomes easy once a polynomial-time reduction to a second problem PN r is available and the complexity of PN r is known, as stated in Definitions 2 and 3 and Theorem 1, whose proof is reported in [17] and several technical books, including [18]. Definition 2. A problem P r is Karp-reducible to a problem PN r (P r <m PN r) if there exists a function f such that x is a positive instance of Pr ” f .x/ is a positive instance of PN r I

(1)

f is called Karp reduction function and an algorithm A that computes f is called a Karp reduction algorithm. If both P r < m PN r and PN r < m P r, P r and PN r are Karp-equivalent (P r m PN r). Definition 3. A problem P r is polynomially Karp-reducible to a problem PN r p (P r <m PN r) if there exists a polynomial-time computable function f such that x is a positive instance of P r ” f .x/ is a positive instance of PN rI

(2)

f is called Karp reduction function and a polynomial-time algorithm A that computes f is called a Karp reduction algorithm.

248

P. Festa

p If both P r <m PN r and PN r p Karp-equivalent (P r m PN r).

p <m P r, P r and PN r are polynomially

p Theorem 1. Let P r and PN r be any two optimization problems such that P r <m PN r , then PN r in the complexity class P of polynomially solvable problems implies P r 2 P.

Hence, Theorem 1 guarantees that problem P r and problem PN r belong to the same complexity class, or in other words problem P r is no harder than problem PN r. In [14], the author used a polynomial-time reduction and theoretical result of Theorem 1 to prove that SPTP belongs to the complexity class P, since it reduces to a single source—single destination shortest path problem (SPP). In the following, for sake of clarity, we report this complexity results stated and proved in [14]. p

Theorem 2. SPTP <m SPP, then SPTP 2 P. Proof. To prove the thesis, a polynomial-time reduction algorithm must be found that transforms any SPTP instance into a single source–single destination SPP instance and vice versa. It is trivial to show that any SPP instance < G D .V; A; C /; s; d > can be polynomially transformed in the SPTP instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N >, where N D 2 and T1 D fsg, T2 D V n fsg. Conversely, there exists a polynomial-time reduction algorithm that transforms any SPTP instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N > into a single source– single destination SPP instance < G 0 D .V 0 ; A0 ; C 0 /; s; d 0 D d C .N 1/ n >, where G 0 is a multistage graph with N stages, each replicating G. Figure 2 depicts the pseudo-code of the reduction algorithm SPTPReduction that performs the following operations. (i) Line 1—V 0 WD f1; 2; : : : ; N ng; A0 WD ;: The set of nodes V 0 and the set of arcs A0 of the multistage graph G 0 are initialized. The set V 0 has n nodes for each stage k 2 f1; : : : ; N g; the set A0 is initially empty. (ii) Loop for in lines 2–12: the stages 1; : : : ; N 1 are constructed. At each iteration, an arc .a; b/ is added to A0 . In particular, for each stage k 2 f1; : : : ; N 1g, for each node v 2 f1; : : : ; ng, and for each adjacent node w 2 F S.v/, .a; b/ D .v C .k 1/ n; w C k n/ with length cvw , if w 2 TkC1 ; .a; b/ D .v C .k 1/ n; w C .k 1/ n/ with length cvw , otherwise. (iii) Loop for in lines 13–17: the stage N is completed. At each iteration, for each node v 2 f1; : : : ; ng and for each adjacent node w 2 F S.v/, an arc .a; b/ is added to A0 connecting node a D v C .N 1/ n to node b D w C .N 1/ n and having length cvw . It is easy to see that jA0 j D N m and therefore the T computational complexity of SPTPReduction is O.N m/. Note that, since N kD1 Tk D ;, it results that N n, and therefore, the worst case computational complexity is O.n m/.

On Some Special Network Flow Problems: The Shortest Path Tour Problems

249

Fig. 2 Pseudo-code of a polynomial reduction algorithm

Figure 3 depicts the multistage graph G 0 corresponding to the SPTP instance on the small graph G of Fig. 1. Note that, jV 0 j D N n D 4 7 D 28, jA0 j D N m D 4 11 D 44, s D 1, d 0 D d C .N 1/ n D 7 C 3 7 D 28. We now claim that in G 0 , as constructed above, there is a path P 0 from s to d 0 of length K if and only if in G there is a path tour PT from s to d of length K. Suppose that in G 0 there is a path P 0 of length K from s to d 0 . Because P 0 connects s 2 T1 to d 0 2 TN , for each k D 1; : : : ; N 1 there must be in P 0 necessarily at least one arc connecting two nodes in consecutive stages k and k C 1. Therefore, it follows that P 0 consists of at least one node in each of the N stages, so corresponding to a path tour PT of length K in G that successively passes through at least one node from the given node subsets T1 ; T2 ; : : : ; TN . Conversely, suppose that in G there is a path tour PT of length K that successively passes through at least one node from the given node subsets T1 ; T2 ; : : : ; TN . Then, by construction, for each arc in PT connecting in G two nodes belonging to consecutive subsets, there exists in the simple path P 0 an arc connecting in G 0 two nodes belonging to consecutive stages, till finally moving to d 0 in the last stage N . t u

250

P. Festa

k=1

k=2

1

8

S 2

1

1

1

2 1

4

4 6 2

23 1 2

17

4

12

18

5

24 1

3

25

4 4

19

26

3

4

3 13

4 20

27 3

2 7

1

1

1 3

11

4

5

3

5

2

1 3

22 1

1 5

10 1

k=4

16

1

3

4

2

9 5

3

vk=v+(k-1)*n= k=3 1+(2-1)*7=8 15 1 1

14

21

2

2

28

d’

L(SP)=11 Fig. 3 The multistage graph G 0 corresponding to the SPTP instance on G of Fig. 1

2.1 Several Alternative Algorithms for the SPTP Several alternative techniques have been designed in [14] to exactly solve the SPTP as defined in Sect. 1. Once obtained in polynomial-time the multistage graph G 0 by applying the algorithm SPTPReduction, any shortest path algorithm can be applied to solve the resulting SPP. Classical SPPs are among the most studied combinatorial problems that arise as subproblems when solving many optimization problems. Exhaustive surveys of the most interesting and efficient shortest path algorithms, important for their computational time complexity or for their practical efficiency, can be found among others in [1, 7–12, 15, 16, 19]. Although the huge number of state-of-theart algorithms for the SPP, there does not exist a best method that outperforms all the others. In fact, recent research lines tend to develop techniques designed ad hoc for solving special structured SPPs: either a special network topology or a special cost structure. In [14], the following algorithms have been designed and tested: • A dynamic programming algorithm, as suggested in [3]. • A Dijkstra-like algorithm [13] that uses a binary heap to store the nodes with temporary labels.

On Some Special Network Flow Problems: The Shortest Path Tour Problems

251

• Several Auction-like algorithms [2, 4]: a forward, a backward, and a combined for/backward version. To describe the dynamic programming approach a slight different notation to represent an expanded graph G 0 D .V 0 ; A0 ; C 0 / has been used. For each node i 2 V , V 0 contains N C 1 nodes .i; 0/, .i; 1/, : : :, .i; N /. The meaning of being in node .i; k/, k D 1; 2; : : : ; N , is that we are at node i and have already successively visited the sets T1 ; : : : ; Tk , but not yet the sets TkC1 ; : : : ; TN . The meaning of being in node .i; 0/ is that we are at node i and have not yet visited any node in the set T1 . For each arc .i; j / 2 A and for each k D 0; 1; : : : ; N 1, we introduce in A0 an arc from .i; k/ to .j; k/, if j … TkC1 or an arc from .i; k/ to .j; k C 1/, if j 2 TkC1 . Moreover, for each arc .i; j / 2 A we introduce in A0 an arc from .i; N / to .j; N /. Once obtained the expanded graph G 0 , the SPTP is equivalent to find a shortest path from .s; 0/ to .d; N /. Let D rC1 .i; k/, k D 0; 1; : : : ; N , be the shortest distance from .i; k/ to the destination node .d; N / using r arcs or less. For k D 0; 1; : : : ; N 1 the DP iteration is the following: D

rC1

.i; k/ D min

D

rC1

min fcij C D .j; k/; min fcij C D .j; k C 1/g

.i; N / D

r

j 2TkC1

j …TkC1

.i;j /2A

(

r

min fcij C D r .j; N /g; if i 6D d I

.i;j /2A

if i D d :

0;

(3)

Initial conditions are the following: D .i; k/ D 0

1; if .i; k/ 6D .d; N /I 0; if .i; k/ D .d; N /:

In [14] it has been proved that the dynamic programming algorithm implementing the above DP iteration is correct and terminates in a finite number of iterations, as stated in the following theorem. Theorem 3. An algorithm implementing the above DP iteration terminates after a finite number of iterations with an optimal solution and its computational complexity is O.N 2 n m/, and O.n3 m/ in the worst case.

2.2 Experimental Results In this subsection, we report on some computational experiments carried in [14] to determine which algorithm among those proposed seems to be more effective to solve the classical SPTP.

252

P. Festa

The following algorithms have been designed and implemented: (a) (b) (c) (d) (e) (f) (g) (h)

Dijkstra forward with binary heap Standard Auction forward Standard Auction backward Combined for/backward Auction fb DP Dijkstra, DP with Dijkstra as initialization phase DP Auction, DP with Auction as initialization phase DP Auction back, DP with Auction backward as initialization phase DP Dijkstra back, DP with Dijkstra backward as initialization phase

Since the algorithm simply implementing DP iteration (3) was too time consuming, in [14] a slightly different variant was proposed that first calculates D.i; N / using a standard shortest path computation (DP Dijkstra, DP Auction, DP Dijkstra, DP Auction back, DP Dijkstra back). The objectives of the computational study were to compare the running times achieved by several alternative algorithms as a function of the parameter N when applied to solve SPTP instances pseudorandomly generated and characterized by several different network topologies, with different densities and number of nodes. The arc lengths have been pseudorandomly generated as integers in the range from 0 to 10000 and two nodes have been randomly chosen to be the source node s and the destination node d , respectively. Moreover, the following graph families have been considered: (1) complete graphs with n 2 f60; 100g; (2) square grids with n D 10 10 and rectangular grids with n D 25 6; (3) random graphs with n D 150 and m 2 f4 n; 8 ng. For each problem family, ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng and the mean time (in second) required to find an optimal solution has been stored and plotted in Figs. 4–9. Looking at the results obtained and analyzed in [14], Dijkstra’s algorithm outperforms all the competitors.

3 Several New Different Variants of the Classical SPTP In this section, several new different variants of the classical SPTP are stated and new results are presented about their reduction to special facility location problems.

3.1 A Special Non-metric Multilevel Uncapacitated Facility Location Problem In the 1-level uncapacitated facility location problem (1-UFLP), a set of clients and a set of facilities are given and the target is to find a subset of facilities to be opened such that all the clients are served by the open facilities while minimizing the total cost of opening facilities and serving clients. In the more general l-level

On Some Special Network Flow Problems: The Shortest Path Tour Problems

253

Complete graphs with n=60 0.3

0.25

Time (sec.)

0.2

0.15

0.1

0.05

0 5

10

15

20

25

30

35

40

45

N Fig. 4 Complete graphs with n D 60: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

uncapacitated facility location problem (l-UFLP), the demands must be routed among facilities in a hierarchical order, i.e., from the highest level (for example, the factories) down to the lowest (for example, the retailers), before reaching the clients. More formally, the l-UFLP can be stated as follows. Given • The set of clients D • l-level sets of sites F1 ; : : : ; Fl , i.e., Fk , k D 1; : : : ; l, is the set of sites where facilities S may be located on level k • F D lkD1 Fk • The cost fik > 0 of setting up facility at site ik 2 Fk , k D 1; : : : ; l • A function C W D [ F D [ F ! RC [ f0g that assigns a nonnegative cost cab 0 of connecting a; b 2 D [ F (the adjective non-metric stands because any assumptions are made on the connecting costs, such as symmetry and/or triangle inequality) each client j 2 D must be served by exactly one open path P D fi1 ; : : : ; il g 2 P D F1 Fl of l facilities with exactly one from each of the l-levels, where a path P is open if and only if every facility on P is open. The total service cost jP incurred by assigning a client j 2 D to an open path P D fi1 ; : : : ; il g 2 P is the

254

P. Festa Complete graphs with n=100

1.6 1.4 1.2

Time (sec.)

1 0.8 0.6 0.4 0.2 0 10

20

30

40

50

60

70

N

Fig. 5 Complete graphs with n D 100: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

total connection cost given by jP D

l1 X

cik ikC1 C cil j :

kD1

Given a l-UFLP instance < D [ F ; C; f ./ >, the objective is to open a subset of facilities such that each client is assigned to an open path and the total cost is minimized, i.e., to choose ; 6D Sk Fk , k D 1; : : : ; l such that X j 2D

min

P 2S1 Sl

jP C

l X X

fik :

kD1 ik 2Sk

is minimized. Let us now consider a special SPTP hereafter called SPTP-1 and defined as follows: Definition 4. The SPTP-1 consists of finding a shortest path from a given origin node s 2 V to a given destination node d 2 V in the graph G with the constraint

On Some Special Network Flow Problems: The Shortest Path Tour Problems

255

Square grid graphs with n=10x10 0.1 0.09 0.08

Time (sec.)

0.07 0.06 0.05 0.04 0.03 0.02 0.02

10

20

30

40

50

60

70

N Fig. 6 Square grids with n D 10 10: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

that the optimal path P should successively pass through Texactly and exclusively one node from given node subsets T1 ; T2 ; : : : ; TN , where N kD1 Tk D ;. As stated and proved in Theorem 4, the SPTP-1 is polynomially Karp-reducible to a special l-UFLP, where

jDj D 1 fik D 1 for each site ik 2 Fk , k D 1; : : : ; l

Let us call this special location problem l-UFLP. It holds the following result. p

Theorem 4. SPTP-1 <m l-UFLP. Proof. To prove the thesis, a polynomial-time reduction algorithm must be found that transforms any SPTP-1 instance into a l-UFLP instance and vice versa. Let us consider any SPTP-1 instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N >. It is easy to see that there exists a polynomial-time reduction algorithm that transforms it into the l-UFLP instance < D [ F ; C; f ./ >, where

256

P. Festa

Rectangular grid graphs with n=25 x 6 0.35

0.3

Time (sec.)

0.25

0.2

0.15

0.1

0.05

0 0

20

40

60

80

100

N Fig. 7 Rectangular grids with n D 25 6: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

• • • •

D D fd g. l D N 1. S 1 Fk D Tk for k D 2; : : : ; N 1, F1 D fsg, and F D N kD1 Fk . The connecting cost function C W D [ F D [ F ! RC [ f0g is the SPTP-1 length function C .

The SPTP-1 instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N > admits a solution path tour PT from s to d of length l.PT / if and only if l-UFLP instance < D [ F ; C; f ./ > admits a solution open path P D fi1 ; : : : ; iN 1 g 2 P D T1 TN 1 of N 1 facilities with exactly one from each of the N 1 levels and having connection cost dP D l.PT /. The total cost of the open path P D fi1 ; : : : ; iN 1 g is l.PT / C N 1. Conversely, there exists a polynomial-time reduction algorithm that transforms any l-UFLP instance < D [ F ; C; f ./ > into a SPTP-1 instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N >, where • V D D [ F [ fsg. • d D j 2 D (remind that jDj D 1, hence D D fj g).

On Some Special Network Flow Problems: The Shortest Path Tour Problems

257

Random graphs with n=150 and m=4 x n 0.2 0.18 0.16

Time (sec.)

0.14 0.12 0.1 0.08 0.06 0.04 0.02 0 10

20

30

40

50

60

70

80

90

100

110

N Fig. 8 Random graphs with n D 150 and m D 4 n: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

N D l C 2. T1 D fsg. Tk D Fk1 for k D 2; : : : ; l C 1 D N 1 and TN D D. The SPTP-1 length function C is the connecting cost function C W D [ F D [ F ! RC [ f0g. • A is made up of all arcs .a; b/ corresponding to a connection cost cab in l-UFLP. Moreover, for each v1 2 F1 an arc .s; v1 / is introduced in A with length csv1 D 0.

• • • •

The l-UFLP instance < D [ F ; C; f ./ > admits a solution open path P D fi1 ; : : : ; il g 2 P D F1 Fl of l facilities with exactly one from each of the l levels and having connection cost dP and total cost dP C l if and only if the SPTP-1 instance < G D .V; A; C /; s; d; N; fTk gkD1;:::;N > admits a solution path tour PT from s to d of length l.PT / D dP . t u Note that, if the connecting costs for the multilevel facility location and the arc lengths for the path tour problem satisfy the triangle inequality, it is straightforward to prove that the metric SPTP is equivalent to the metric l-UFLP. As special multilevel uncapacitated facility location problem, SPTP-1 can be formulated as the following integer linear programming problem.

258

P. Festa

Random graphs with n=150 and m=8 x n 0.35

0.3

Time (sec.)

0.25

0.2

0.15

0.1

0.05

0 10

20

30

40

50

60

70

80

90

100

110

N Fig. 9 Random graphs with n D 150 and m D 8 n: ten different instances have been generated for each possible value of N 2 f10%n; 30%n; 50%n; 70%ng. For each algorithm and for each instance, the mean running time (over ten trials) required to find an optimal solution has been stored and plotted as a function of the parameter N of node subsets

Introducing a Boolean decision variable xdP for each path P 2 P s.t. xdP D

1; if node d is the terminal node of the path tour P I 0; otherwise;

then, (SPTP-1) min

X

dP xdP

P2 P

s.t.

X

xdP 1

(5)

P2 P

xdP 2 f0; 1g; 8 P 2 P

(6)

Constraint (5) imposes that the destination node d is terminal node of at least one path tour.

On Some Special Network Flow Problems: The Shortest Path Tour Problems

259

3.2 The Weighted Metric SPTP (W-mSPTP) The weighted metric SPTP (W-mSPTP) can be stated as follows. Definition 5. Given a directed graph G D .V; A; C; W /, where W W V 7! RC is a function that assigns a positive weight wi to each node i 2 V , and the length function C assigns a nonnegative length cij to each arc .i; j / 2 A such that • cij D cj i , for each .i; j / 2 A (symmetry) • cij cih C chj , for each .i; j /; .i; h/; .h; j / 2 A (triangle inequality) then, the W-mSPTP consists of finding a minimal cost path (in terms of both total length and total weight of the involved nodes) from a given origin node s 2 V to a given destination node d 2 V in the graph G with the constraint that the optimal path P should successively T pass through at least one node from given node subsets T1 ; T2 ; : : : ; TN , where N kD1 Tk D ;. Formally, given a W-mUFLP instance < G D .V; A; C; W /; s; d; N; fTk gkD1;:::;N >, the objective is to find a path P D fi1 D s; : : : ; iN D d g 2 T1 TN from s 2 T1 to d 2 TN corresponding to the minimum total cost, i.e., to choose ; 6D Sk Tk , k D 1; : : : ; N such that min

P 2S1 Sk

.P / C

N X X

wik

kD1 ik 2Sk

P 1 is minimized, where .P / D N kD1 cik ikC1 . As stated in Theorem 5, the W-mSPTP is polynomially Karp-reducible to a special l-UFLP, where jDj D 1. Let us call this special location problem l-1-UFLP. It holds the following result: p

Theorem 5. W-mSPTP <m l-1-UFLP. Proof. To prove the thesis, a polynomial-time reduction algorithm must be found that transforms any W-mSPTP instance into a l-1-UFLP instance and vice versa. Once assimilated the setting up facility costs f ./ with the node weight function W ./, the polynomial reduction can be proved following similar reasonings as for the claim of Theorem 4. The proof is completed by observing that the l-1-UFLP instance < D [ F ; C; f ./ > admits a solution open path P D fi1 ; : : : ; il g 2 P D F1 Fl of l facilities with exactly one from each of the l levels and having connection cost dP and total cost dP C

l X X kD1 ik 2Sk

fik

260

P. Festa

if and only if the W-mSPTP instance < G D .V; A; C; W /; s; d; N; fTk gkD1;:::;N > admits a solution P from s to d of length l.P / D .P / D dP and total cost given by N X X wik : dP C

t u

kD1 ik 2Sk

3.3 The Weighted Metric 1-q-SPTP (W-1-q-mSPTP) Let us consider a further variant of the problem: the weighted metric 1-q-SPTP (W1-q-mSPTP) stated as follows: Definition 6. Given a directed graph G D .V; A; C; W /, where W W V 7! RC is a function that assigns a positive weight wi to each node i 2 V , and the length function C assigns a nonnegative length cij to each arc .i; j / 2 A such that • cij D cj i , for each .i; j / 2 A (symmetry) • cij cih C chj , for each .i; j /; .i; h/; .h; j / 2 A (triangle inequality) then, the W-1-q-mSPTP consists of finding a minimal cost path (in terms of both total length and total weight of the involved nodes) from a given origin node s 2 V to each destination node dr 2 D TN in the graph G with the constraint that each corresponding optimal path Pdr should successively pass through at least one node T from given node subsets T1 ; T2 ; : : : ; TN , where N kD1 Tk D ;. Formally, given a W-1-q-mUFLP instance < G D .V; A; C; W /; s; D; N; fTk gkD1;:::;N >; the objective is to find for each dr 2 D a path Pdr D fi1 D s; : : : ; iN D dr g 2 T1 TN from s 2 T1 to dr corresponding to the minimum total cost, i.e., to choose ; 6D Sk Tk , k D 1; : : : ; N such that X dr 2D

min

Pr 2S1 Sl

.Pr / C

N X X

wik :

kD1 ik 2Sk

is minimized. Theorem 6 claims that the W-1-q-mUFLP is polynomially Karp-reducible to the classical (metric) multilevel uncapacitated facility location problem (l-UFLP). p

Theorem 6. W-1-q-mUFLP <m l-UFLP. Proof. To prove the thesis, a polynomial-time reduction algorithm must be found that transforms any W-1-q-mUFLP instance into a l-UFLP instance and vice versa.

On Some Special Network Flow Problems: The Shortest Path Tour Problems

261

Once assimilated the setting up facility costs f ./ with the node weight function W ./ and the set of clients D with the set of destinations D, the polynomial reduction can be proved following similar reasonings as for the claim of Theorems 4 and 5. The proof is completed by observing that the l-UFLP instance admits a solution made of jDj open paths Pj D fi1 ; : : : ; il g 2 P D F1 Fl (j D 1; : : : ; jDj)Pof l facilities with exactly one from each of the l levels and having connection cost j 2D jP and total cost X

jP C

j 2D

l X X

fik

kD1 ik 2Sk

if and only if the W-1-q-mUFLP instance < G D .V; A; C; W /; s; D; N; fTk gkD1;:::;N > admits a solution made of jDj paths Pr from s to dr 2 D (r D 1; : : : ; jDj). Each path Pr has l.Pr / D .Pr / D dr P and the total cost of the solution is given by X

dr P C

N X X

t u

wik :

kD1 ik 2Sk

dr 2D

A consequence of Theorem 6 is that W-1-q-mUFLP can be formulated as the following linear programming problem. jT j Let be T D [N s.t. kD1 Tk and let us define a Boolean decision vector y 2 f0; 1g 8 ik 2 Tk , k D 1; : : : ; N yik D

1; if node ik is in Pr for some r 2 f1; : : : ; jDjgI 0; otherwise:

Introducing a Boolean decision variable xdr P for each path P 2 P and each destination node dr 2 D s.t. xdr P D

1; if node dr is the terminal node of Pr I 0; otherwise;

then, (W-1-q-mUFLP) min

X X

dr P xdr P C

P 2 P dr 2D

s.t.

X P2P

xdr P D 1;

N X

wik yik

kD1

8 dr 2 D;

(7)

262

P. Festa

X

xdr P yik 0;

8 dr 2 D;

P 2PW ik 2P

8 i k 2 Tk ;

(8)

k D 1; : : : ; N; xdr P 2 f0; 1g;

8 P 2 P;

(9)

8 dr 2 D; yik 2 f0; 1g;

8 i k 2 Tk ; k D 1; : : : ; N:

(10)

Constraint (7) imposes that each destination node dr is terminal node of at least one path. Constraints (8) guarantee that each destination dr cannot be terminal node of a path P unless P passes through node ik . In fact, if yik D 0, then the sum of all assignment variables for node dr to use paths containing ik must also be 0. Note that the combination of constraints (7) and (9) allows to relax constraints (9) that can be replaced by xdr P 0; 8 P 2 P; 8 dr 2 D. Similarly, constraints (10) can be replaced by yik 0; 8 ik 2 Tk ; k D 1; : : : ; N , since the sum in constraints (8) is bounded from above by the sum in constraints (7) and wi > 0, for each i 2 V .

4 Conclusions and Future Directions This paper studies the SPTPs, special network flow problems recently proposed in the literature that have originated from applications in combinatorial optimization problems with precedence constraints to be satisfied. In [14], the classical and simplest version of the problem has been proved to be polynomially solvable since it reduces to a special single source–single destination SPP. In that paper, several alternative exact algorithms have been proposed and the results of an extensive computational experience are reported to demonstrate empirically which algorithms result more efficient in finding an optimal solution to several different problem instances. Looking at the results, Dijkstra’s algorithm outperforms all the competitors. Nevertheless, further experiments would be needed on a wider set of instances and further investigation is planned in the next future in order to implement and test a collection of different algorithms that • Use path length upper bounds [4] • Mix Auction and graph collapsing [5] and virtual sources [6] ideas • Use the structure of the SPTP and/or the structure of the expanded graph In this paper, several different variants of the classical SPTP have been stated and formally described as special facility location problems. This relationship between

On Some Special Network Flow Problems: The Shortest Path Tour Problems

263

the two families of problems suggests that the SPTPs could be a powerful tool usable to attack the location problems. It appears that much work could be done along this direction, both with regard to approximation and exact algorithms for location problems. In addition, thinking to future research it would be also interesting T to study some further variants of the SPTP and their complexity where the constraint N kD1 Tk D ; is relaxed and/or arc capacity constraints are added.

References 1. Ahuja, R.K., Magnanti, T.L., Orlin, J.B.: Network Flows: Theory, Algorithms and Applications. Prentice-Hall Englewood Cliffs (1993) 2. Bertsekas, D.P.: An auction algorithm for shortest paths. SIAM J. Optim. 1, 425–447 (1991) 3. Bertsekas, D.P.: Dynamic Programming and Optimal Control. 3rd Edition, Vol. I. Athena Scientific (2005) 4. Bertsekas, D.P., Pallottino, S., Scutell`a, M.G.: Polynomial auction algorithms for shortest paths. Comput. Optim. Appl. 4, 99–125 (1995) 5. Cerulli, R., Festa, P., Raiconi, G.: Graph collapsing in shortest path auction algorithms. Comput. Optim. Appl. 18, 199–220 (2001) 6. Cerulli, R., Festa, P., Raiconi, G.: Shortest path auction algorithm without contractions using virtual source concept. Comput. Optim. Appl. 26(2), 191–208 (2003) 7. Cherkassky, B.V., Goldberg, A.V.: Negative-cycle detection algorithms. Math. Prog. 85, 277–311 (1999) 8. Cherkassky, B.V., Goldberg, A.V., Radzik, T.: Shortest path algorithms: theory and experimental evaluation. Math. Prog. 73, 129–174 (1996) 9. Cherkassky, B.V., Goldberg, A.V., Silverstein, C.: Buckets, heaps, lists, and monotone priority queues. SIAM J. Comput. 28, 1326–1346 (1999) 10. Denardo, E.V., Fox B.L.: Shortest route methods: 2. group knapsacks, expanded networks, and branch-and-bound. Oper. Res. 27, 548–566 (1979) 11. Denardo, E.V., Fox, B.L.: Shortest route methods: reaching pruning, and buckets. Oper. Res. 27, 161–186 (1979) 12. Deo, N., Pang, C.: Shortest path algorithms: taxonomy and annotation. Networks 14, 275–323 (1984) 13. Dijkstra E.: A note on two problems in connexion with graphs. Numer. Math. 1, 269–271 (1959) 14. Festa, P.: Complexity analysis and optimization of the shortest path tour problem. Optim. Lett.(to appear) 1–13 (2011). doi: 10.1007/s11590-010-0258-y 15. Gallo, G., Pallottino, S.: Shortest path methods: a unified approach. Math. Prog. Study. 26, 38–64 (1986) 16. Gallo, G., Pallottino, S.: Shortest path methods. Ann. Oper. Res. 7, 3–79 (1988) 17. Karp, R.M.: Reducibility among combinatorial problems. In: Miller, R.E., Thatcher, J.W. (eds.) Complexity of Computer Computations. Plenum Press (1972) 18. Papadimitriou, C.H., Steiglitz, K.: Combinatorial optimization: Algorithms and complexity. Prentice-Hall (1982) 19. Shier, D.R., Witzgall, C.: Properties of labeling methods for determining shortest path trees. J. Res. Nat. Bur. Stand. 86, 317–330 (1981)

Part III

Game Theory and Cooperative Control Foundations for Dynamics of Information Systems

A Hierarchical MultiModal Hybrid Stackelberg–Nash GA for a Leader with Multiple Followers Game Egidio D’Amato, Elia Daniele, Lina Mallozzi, Giovanni Petrone, and Simone Tancredi

Abstract In this paper a numerical procedure based on a genetic algorithm (GA) evolution process is given to compute a Stackelberg solution for a hierarchical nC1-person game. There is a leader player who enounces a decision before the others, and the rest of players (followers) take into account this decision and solve a Nash equilibrium problem. So there is a two-level game between the leader and the followers, called Stackelberg–Nash problem. The idea of the Stackelberg-GA is to bring together genetic algorithms and Stackelberg strategy in order to process a genetic algorithm to build the Stackelberg strategy. In the lower level, the followers make their decisions simultaneously at each step of the evolutionary process, playing a so called Nash game between themselves. The use of a multimodal genetic algorithm allows to find multiple Stackelberg strategies at the upper level. In this model the uniqueness of the Nash equilibrium at the lower-level problem has been supposed. The algorithm convergence is illustrated by means of several test cases.

E. D’Amato Dipartimento di Scienze Applicate, Universit`a degli Studi di Napoli “Parthenope”, Centro Direzionale di Napoli, Isola C 4 - 80143 Napoli, Italy e-mail: egi[email protected] E. Daniele • S. Tancredi Dipartimento di Ingegneria Aerospaziale, Universit`a degli Studi di Napoli “Federico II”, Via Claudio 21 - 80125 Napoli, Italy e-mail: [email protected]; [email protected] G. Petrone Mechanical Engineering and Institute for Computational Mathematical Engineering Building 500, Stanford University. Stanford, CA 94305-3035 e-mail: [email protected] L. Mallozzi () Dipartimento di Matematica e Applicazioni, Universit`a degli Studi di Napoli “Federico II”, Via Claudio 21 - 80125 Napoli, Italy e-mail: [email protected] 267 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 14, © Springer Science+Business Media New York 2012

268

Keywords Genetic algorithm • Hierarchical • Stackelberg strategy

E. D’Amato et al.

game • Nash

equilibrium

1 Introduction The idea to use genetic algorithms to compute solutions to problems arising in Game Theory can be found in different papers [7, 13, 15, 16]. More precisely, in [15] the authors solve a Stackelberg problem with one leader and one follower (leader– follower model) by using genetic algorithm; in [13] the authors solve with GA a Nash equilibrium problem, the well known solution concept in Game Theory for a n players noncooperative game. Both types of solutions are considered in a special aerodynamics problem by [16]. A more general case, dealing with one leader and multiple followers, is the socalled Stackelberg–Nash problem, largely used in different applicative contexts as Transportation or Oligopoly Theory. The paper by [7] designs a genetic algorithm for solving Stackelberg–Nash equilibrium of nonlinear multilevel programming with multiple followers. In this paper, we deal with a general Stackelberg–Nash problem and assume the uniqueness of the Nash equilibrium solution of the follower players. We present a genetic algorithm suitable to handle multiple solutions for the leader by using multimodal optimization tools. In the first stage one of the players, called the leader, chooses an optimal strategy knowing that, at the second stage, the other players react by playing a noncooperative game which admits one Nash equilibrium, while a multiple Stackelberg solution may be managed at upper level. In the same spirit of [15], the followers’ best reply is computed at each step. For any individual of the leader’s population, in our case, multiple followers compute a Nash equilibrium solution, by using a genetic algorithm based on the classical adjustment process [5]. Then, the best reply Nash equilibrium—supposed to be unique—is given to the leader and an optimization problem is solved. We consider also the possibility that the leader may have more than one optimal solution, so that the multimodal approach based on the sharing function let us to reach all this possible solutions in the hierarchical process. A step by step procedure for optimization based on genetic algorithms (GA) has been implemented starting from a simple Nash equilibrium, through a Stackelberg solution, up to a hierarchical Stackelberg–Nash game, validated by different test cases, even in comparison with other researchers proposals [15, 16]. A GA is presented for a Nash equilibrium problem in Sect. 2 and for a Stackelberg–Nash problem in Sect. 3, together with test cases. Then some applications of the real life are indicated in the concluding Sect. 4.

A Hierarchical MultiModal Hybrid Stackelberg–Nash GA

269

1.1 The Stackelberg–Nash Model Let us consider an n+1 player game, where one player P0 is the leader and the rest of them P1 ; : : : ; Pn are followers in a two-level Stackelberg game. Let X; Y1 ; : : : ; Yn be compact, nonempty, and convex subsets of an Euclidean space that are the leader’s and the followers’ strategy sets, respectively. Let l; f1 ; : : : ; fn be real-valued functions defined on X Y1 Yn representing the leader’s and the followers’ cost functions. We also assume that l; f1 ; : : : ; fn are continuous in .x; y1 ; : : : ; yn / 2 X Y1 Yn and that fi is strictly convex in yi for any i D 1; : : : ; n. We assume that players are cost minimizers. The leader is assumed to announce his strategy x 2 X in advance and commit himself to it. For a given x 2 X the followers select .y1 ; : : : ; yn / 2 R.x/ where R.x/ is the set of the Nash equilibria of the n-person game with players P1 ; : : : ; Pn , strategy sets Y1 ; : : : ; Yn and cost functions f1 ; : : : ; fn . In the Nash equilibrium solution concept, it is assumed that each player knows the equilibrium strategies of the other players and no player has anything to gain by changing only his own strategy unilaterally [1]. For each x 2 X , which is the leader’s decision, the followers solve the following lower-level Nash equilibrium problem N .x/: 8 ˆ find .yN1 ; : : : ; yNn / 2 Y1 Yn such that ˆ ˆ ˆ ˆ ˆ f1 .uk1 ; vki /; fitness1 D 1 < if f1 .uki ; vk1 / < f1 .uk1 ; vki /; fitness1 D 1: ˆ ˆ :if f .uk ; vk1 / D f .uk1 ; vk /; fitness D 0 1 i 1 1 i

Similarly, for player 2: 8 k k1 k1 k ˆ ˆ f2 .uk1 ; vki /; fitness2 D 1: ˆ ˆ :if f .uk ; vk1 / D f .uk1 ; vk /; fitness D 0 2 i 2 2 i In this way a simple sorting criterion could be established. For equal fitness value individual are sorted on objective function f1 for population 1 (player 1) and on objective function f2 for player 2. 3. A mating pool for parent chromosome is generated and common GA techniques as crossover and mutation are performed on each player population. A second sorting procedure is needed after this evolution process. 4. At the end of kth generation optimization procedure player 1 communicates his own best value uk to player 2 who will use it at generation k C 1 to generate its entire chromosome with a unique value for its first part, i.e., the one depending on player 1, while on the second part comes from common GAs crossover and mutation procedure. Conversely, player 2 communicates its own best value vk to player 1 who will use it at generation kC1, generating a population with a unique value for the second part of chromosome, i.e., the one depending on player 2;

A Hierarchical MultiModal Hybrid Stackelberg–Nash GA Table 1 GA details

273

Parameter

Value

Population size [-] Crossover fraction [-] Mutation fraction [-] Parent sorting Mating pool [%] Elitism Crossover mode Mutation mode dmin for multimodal [-]

50 0.90 0.10 Tournament between couples 50 No Simulated Binary Crossover (SBX) Polynomial 0.2

5. A Nash equilibrium is found when a terminal period limit is reached, after repeating the steps 2–4. This kind of structure for the algorithm is similar to those used by other researchers, with a major emphasis on fitness function consistency [16].

2.2 Test Case In this test case and also in all the subsequent ones the characteristics the of GAs algorithm are summarized in Table 1. For the algorithm validation we consider the following example presented in [16]: the strategy sets are Y1 D Y2 D Œ5; 5 and f1 .y1 ; y2 / D .y1 1/2 C .y1 y2 /2 f2 .y1 ; y2 / D .y2 3/2 C .y1 y2 /2 for which the analytical solution is y1 N D

5 7 ; y2 N D : 3 3

By using the proposed algorithm our numerical results are yO1N D 1:6665; yO 2N D 2:3332:

274

E. D’Amato et al.

3 Hierarchical Stackelberg–Nash Genetic Algorithm 3.1 Stackelberg Genetic Algorithm Here the algorithm is presented for a two-player leader–follower game or Stackelberg game. Let X; Y be compact subsets of metric spaces that are the players’ strategy sets. Let l; f be two real-valued functions defined on X Y representing the players’ cost functions [15]. For any x 2 X leader’s strategy, the follower solves the problem 8 0, .P/

˘ ˘P .P/ D 2a˘ .P/ C 2 C ; ˘ .P/ .0/ D 1; ˛ ˘ .E/ ˘ .E/ ˘P .E/ D 2a˘ .E/ C 2 .P/ C ; ˘ .E/ .0/ D 1; 0 t T; ˘ ˛ must be solved. In general, nonzero-sum differential games are harder to solve than their zero-sum counterpart.

4 Open-Loop Nash Equilibrium in Nonzero-Sum Differential Games We now address the solution of the nonzero-sum differential game (1)–(3) using open-loop P and E strategies u.tI x0 / and v.tI x0 /, respectively: the information available to the P and E players is the initial state information only, x0 . A NE is sought where the NE strategies of players P and E are the respective controls u .tI x0 / and v .tI x0 /, 0 t T . The PMM applies. We form the Hamiltonians H .P/ .t; x; u; .P/ / D L.P/ .t; x; u; v .tI x0 // C ..P/ /T f .t; x; u; v .tI x0 //

(37)

The Role of Information in Nonzero-Sum Differential Games

291

and H .E/ .t; x; v; .E/ / D L.E/ .t; x; u .tI x0 /; v/ C ..E/ /T f .t; x; u .tI x0 /; v/ (38) A necessary condition for the existence of a NE in open-loop strategies entails the existence of nonvanishing costates .P/ .t/ and .E/ .t/, 0 t T , which satisfy the differential equations d.P/ .P/ D Hx.P/ ; .P/ .T / D QF x.T / dt

(39)

d.E/ .E/ D Hx.E/ ; .E/ .T / D QF x.T / dt

(40)

and

According to the PMM, a static nonzero-sum game with the P and E players’ respective costs (37) and (38) is solved 8 0 t T . The optimal control of P is given by the solution of the equation in u, @H .P/ .t; x; u; .P/ / D 0; @u

(41)

Q x; .P/ I v .tI x0 // u .t/ D .t;

(42)

that is,

The optimal control of E is given by the solution of the equation in v, @H .E/ .t; x; v; .E/ / D 0; @v

(43)

v .t/ D Q .t; x; .E/ I u .tI x0 //I

(44)

that is

The functions Q and Q are known and, in principle, one can solve the set of two equations in u and v , (42) and (44). One obtains the “control laws” u D .t; x; .P/ ; .E/ /

(45)

v D

(46)

and .t; x; .P/ ; .E/ /

In (45) and (46) the functions and are known. In the static game the P and E players’ cost functions H .P/ and H .E/ were parametrized by .P/ and .E/ , respectively. Hence, the solutions (45) and (46) of

292

M. Pachter and K. Pham

the static Nash game are also parametrized by .P/ and .E/ . That is why we have used quotation marks to emphasize that (45) and (46) should not be considered control laws/strategies, because the costates .P/ and .E/ are not yet determined. The optimal “control laws” (45) and (46) are inserted into (1), yielding the optimal trajectory dx D f .t; x ; .t; x ; .P/ ; .E/ /; .t; x ; .P/ ; .E/ //; x.0/ D x0 ; 0 t T dt (47) The open-loop Nash equilibrium is found upon solving the TPBVP (39), (40), and (47) using (45) and (46).

5 Nonzero-Sum LQ Games: Open-Loop Control The theory developed in Sect. 4 is now applied to the solution of the open-loop nonzero-sum LQ differential game (16)–(18). The Hamiltonians are H .P/ .t; x; u; .P/ / D x T Q.P/ x C uT R.P/ uC..P/ /T .AxCBuCC v .tI x0 //

(48)

and H .E/ .t; x; v; .E/ / D x T Q.E/ xCvT R.E/vC..E/ /T .AxCBu .tI x0 /CC v/

(49)

Consequently, the functions .t; x; .P/ ; .E/ / D 12 .R.P/ /1 B T .P/ ;

(50)

.t; x; .P/ ; .E/ / D 12 .R.E/ /1 C T .E/

(51)

Using (39), (40), and (47) we obtain the linear TPBVP (52)–(54): d.P/ dt d.E/ dt

.P/

D AT .P/ 2Q.P/ x ; .P/ .T / D QF x.T / .E/

D AT .E/ 2Q.E/x ; .E/ .T / D QF x.T /

(52) (53)

The Role of Information in Nonzero-Sum Differential Games

293

and 1 dx 1 B T .P/ CC.R.E/ /1 C T .E/ ; x.0/ D x0 ; 0 t T D Ax B R.P/ dt 2 (54)

In order to avoid the need to solve the TPBVP, proceed as follows. Claim B The costate .P/ .t/ D 2P .P/ .t/ x .tI x0 /

(55)

.E/ .t/ D 2P .E/ .t/ x .tI x0 /;

(56)

and the costate

where P .P/ .t/ and P .E/ .t/ are real, symmetric n n matrices 8 0 t T . Inserting (55) and (56) into (52)–(54) yields as set of two coupled Riccati type matrix differential equations dP .P/ D AT P .P/ P .P/ A Q.P/ C P .P/ B.R.P/ /1 B T P .P/ dt i 1 T .E/ 1 1h .P/ C P P / C R.E/ C P C P .E/ C T R.E/ CP .P/ ; P P .T / D QF 2

and dP .E/ D AT P .E/ P .E/ A Q.E/ C P .E/ C.R.E/ /1 C T P .E/ dt 1 1 .E/ C P .E/ B.R.P/ /1 B T P .P/ C P .P/ B T R.P/ BP .E/ ; P E .T / D QF 2

Once P .P/ .t/ and P .E/ .t/ have been calculated, the open-loop NE strategy of P is explicitly given by 1 u .tI x0 / D .R.P/ /1 B T P .P/ .t/ x .t/ 2 and the open-loop NE strategy of E is explicitly given by 1 v .tI x0 / D .R.E/ /1 C T P .E/ .t/ x .t/I 2

294

M. Pachter and K. Pham

the optimal trajectory x .t/ is given by the solution of the linear differential equation

1 dx D A B.R.P/ /1 B T P .P/ C C.R.E/ /1 C T P .E/ x ; dt 2 x .0/ D x0 ; 0 t T The above obtained result is summarized in Theorem 2. A (unique) solution to the open-loop nonzero-sum LQ differential game (16)–(18) exists 8 x0 2 Rn iff a solution on the interval 0 t T of the two coupled Riccati-type matrix differential equations dP .P/ D AT P .P/ C P .P/ A P .P/ B.R.P/ /1 B T P .P/ C Q.P/ dt 1 1 1 .P/ P .P/ C R.E/ C T P .E/ C P .E/ C T R.E/ CP .P/ ; P P .0/ D QF 2 (57)

and dP .E/ D AT P .E/ C P .E/ A C Q.E/ P .E/ C.R.E/ /1 C T P .E/ dt 1 1 1 .E/ P .E/ B R.P/ B T P .P/ C P .P/ B T R.P/ BP .E/ ; P E .T / D QF 2 (58)

exists. The open-loop NE strategy of P is 1 u .tI x0 / D .R.P/ /1 B T P .P/ .T t/ x .t/ 2

(59)

and the open-loop NE strategy of E is 1 v .tI x0 / D .R.E/ /1 C T P .E/ .T t/ x .t/; 2

(60)

where x .t/, the optimal trajectory, is given by the solution of the linear differential equation 1 dx .P/ 1 T .P/ .E/ 1 T .E/ D A ŒB.R / B P .T t/ C C.R / C P .T t/ x ; dt 2 x .0/ D x0 ; 0 t T

(61)

Finally, the respective values of P and E are V .P/ .x0 / D x0T P .P/ .T /x0

(62)

The Role of Information in Nonzero-Sum Differential Games

295

and V .E/ .x0 / D x0T P .E/ .T /x0

(63)

Evidently, the solution of the open-loop nonzero-sum LQ differential game hinges on the solution of the set of Riccati equations (57) and (58) on the interval 0 t T . A solution always exists for T sufficiently small.

5.1 Discussion It is remarkable that also the solution of the open-loop LQ differential game hinges on the existence of a solution to a system of Riccati equations. However, the solutions P .P/ .t/ and P .E/ .t/ of Riccati differential equations (57) and (58) which pertain to the case where the players P and E both play open-loop are not the same as the solutions of Riccati differential equations (27) and (28) which pertain to the case where the players P and E both use closed-loop strategies. Thus, we denote the .P/ .E/ solution of the system of Riccati equations (27) and (28) by PC C .t/, and PC C .t/, .P/ and the solution of the system of Riccati equations (57) and (58) by POO .t/ and .E/ POO .t/. These determine the values of the respective closed-loop and open-loop nonzero-sum differential games. Since Riccati equations (57) and (58) are not identical to Riccati equations (27) and (28), the open-loop values are different from the values obtained when feedback strategies are used. Indeed, consider the scalar minimum energy nonzerosum differential game discussed in Sect. 3.1. In the scalar closed-loop game the Riccati equations, (27) and (28), are b 2 .P/ 2 c 2 .P/ .E/ .P/ .P/ .P/ .P/ PPC C D 2aPC C .P/ PC C 2 .E/ PC C PC C ; PC C .0/ D qF r r c 2 .E/ 2 b 2 .P/ .E/ .E/ .E/ .E/ .E/ PPC C D 2aPC C .E/ PC C 2 .P/ PC C PC C ; PC C .0/ D qF ; 0 t T r r We “integrate” the differential system and we calculate b 2 .P/ 2 c 2 .P/ .E/ .P/ .P/ .P/ PC C .T / D qF C 2aqF .P/ qF C 2 .E/ qF qF T r r c 2 .E/ 2 b 2 .P/ .E/ .E/ .E/ .E/ PC C .T / D qF C 2aqF C .E/ qF 2 .P/ qF qF T r r

296

M. Pachter and K. Pham

In the scalar open-loop game Riccati equations, (57) and (58), are b 2 .P/ 2 c 2 .P/ .E/ .P/ .P/ .P/ .P/ PPOO D 2aPOO .P/ POO .E/ POO POO ; POO .0/ D qF r r c 2 .E/ 2 b 2 .P/ .E/ .E/ .E/ .E/ .E/ PPOO D 2aPOO .E/ POO .P/ POO POO ; POO .0/ D qF ; 0 t T r r We “integrate” the differential system and we calculate b 2 .P/ 2 c 2 .P/ .E/ .P/ .P/ .P/ C .E/ qF qF T POO .T / D qF C 2aqF .P/ qF r r 2 2 c b 2 .P/ .E/ .E/ .E/ .E/ .E/ POO .T / D qF C 2aqF C .E/ qF .P/ qF qF T r r From the above calculations we conclude .P/

.P/

.E/

.E/

POO .T / < PC C .T / and POO .T / < PC C .T / In summary, we have Proposition 2. In the scalar nonzero-sum LQ differential game and for T sufficiently small, the players’ values satisfy .P/

.P/

.E/

.E/

POO .t/ < PC C .t/ and POO .t/ < PC C .t/ 8 0 t T. It goes without saying that the range of the game horizon T s.t. Proposition 4 .P/ .E/ holds depends on the problem parameters a, b, c, qF , qF , r .P/ , and r .E/ . .P/

.E/

Example 1. Scalar nonzero-sum differential game. The solutions PC C and PC C of .P/ .E/ Riccati equations (27) and (28) are compared to the solutions POO and POO of Riccati equations (57) and (58). .P/ .E/ The parameters are qF D qF D 1, r .P/ D 12 , r .E/ D 1, b D c D 1, and a D 1. The values of the game when the initial state j x0 jD 1 are shown in Fig. 1. The E-player is always better off when open-loop strategies are employed and the P-player is better off when open-loop strategies are employed, provided that the game horizon T < 0:4258.

The Role of Information in Nonzero-Sum Differential Games

297

When the dynamics parameter a D 1, both players are better off playing openloop, irrespective of the length of the game horizon T —see, e.g., Fig. 2. Not only does the open-loop solution not yield the solution to the closed-loop differential game, as is the case in optimal control and zero-sum differential games, but also, in addition, both players are better off using open-loop strategies as if only the initial state information x0 were available to them. Indeed, it is most interesting that both players’ open-loop values are lower than their respective closed-loop values: having access to the current state information does no good to the players.

6 Open-Loop vs. Closed-Loop Play in LQ Differential Games Since in nonzero-sum differential games the open-loop solution ¤ closed-loop solution, it is interesting to also consider nonzero-sum differential games with an asymmetric information pattern where P uses a closed-loop strategy against player E who is committed to an open-loop strategy v.tI x0 /, 0 t T , and vice versa. We consider the nonzero-sum LQ differential game (16)–(18) where P uses state feedback whereas E plays open-loop. In this case player P uses DP against E’s control v.t/, 0 t T , whereas player E applies the PMM against P’s state feedback strategy u.t; x/. Hence, the respective Hamiltonians of players P and E are as follows. P’s Hamiltonian H .P/ .t; x; u; / D x T Q.P/ x C uT R.P/ u C T ŒAx C Bu C C v.t/; where Vx.P/ Consequently, the optimal “control law” is 1 u.t; x; Vx.P/ / D .R.P/ /1 B T Vx.P/ 2 E’s Hamiltonian H .E/ .t; x; v; / D x T Q.P/ x vT R.E/ v C T ŒAx C Bu C C v.t/; and consequently the optimal “control law” is v.t; x; / D Thus, the following holds.

1 .E/ 1 T .R / C 2

298

M. Pachter and K. Pham

2

pccp pcce poop pooe

T: 0.4258 P: 1.403

1.5 1 0.5 0 −0.5 −1 −1.5 −2

0

0.5

1

1.5

2

2.5

3

Fig. 1 Open-loop values < closed-loop values

1 pccp pcce poop pooe

0.8 0.6 0.4 0.2 0 −0.2 −0.4 −0.6 −0.8 −1

0

0.5

1

1.5

2

2.5

Fig. 2 Open-loop values < closed-loop values 8 T > 0

3

3.5

4

4.5

5

The Role of Information in Nonzero-Sum Differential Games

299

Applying the method of DP we obtain the PDE

@V .P/ 1 D x T Q.P/ x C x T AT Vx.P/ .Vx.P/ /T B.R.P/ /1 B T Vx.P/ @t 4 1 .P/ T .P/ C .Vx / C.R.E//1 C T ; Vx.P/ .T; x/ D x T QF x 8 x 2 Rn (64) 2

Applying the PMM we obtain the costate equation

d @u.t; x/ T .E/ T .E/ T D A 2Q x B ; .T / D 2QF x.T / dt @x Now 1 u.t; x/ D .R.P/ /1 B T Vx.P/ .t; x/ 2 so that 1 @u.t; x/ .P/ D .R.P/ /1 B T Vxx @x 2 and therefore 1 .P/ d D AT 2Q.E/x AT x C Vxx .t; x/B.R.P/ /1 B T ; dt 2 .E/

.T / D 2QF x.T /

(65)

Finally, the state evolves according to 1 dx 1 D Ax B.R.P/ /1 B T Vx.P/ .t; x/ C C.R.E/ /1 C T ; x.0/ D x0 dt 2 2

(66)

We must solve the above boundary value problem which entails a system of three equations—the PDE (64) and the two ODEs (65) and (66). We shall require Claim C V .P/ .t; x/ D x T P .P/ .t/x; 0 t T;

(67)

where P .P/ .t/ is a real, symmetric matrix, 0 t T . Inserting the expression (67) for V .P/ .t; x/ into (64) and symmetrizing yield x T PP .P/ x D x T AT P .P/ xCx T P .P/ Ax x T P .P/ B.R.P/ /1 B T P .P/ xCx T Q.P/ x 1 1 C x T P .P/ C.R.E/ /1 C T C T C.R.E//1 C T P .P/ x ; 2 2 .P/

P .P/ .T / D QF

(68)

300

M. Pachter and K. Pham

and inserting the expression (67) for V .P/ .t; x/ into (65) and (66) yields .E/ P D AT 2Q.E/x C P .P/ B.R.P/ /1 B T ; .T / D 2QF x.T /

(69)

1 xP D Ax B.R.P/ /1 B T P .P/ x C C.R.E//1 C T ; x.0/ D x0 2

(70)

and

We shall also require Claim D .t/ D 2P .E/ .t/x;

(71)

where P .E/ .t/ is a real, symmetric matrix, 0 t T . Inserting the expression (71) for .t/ into (68) yields PP .P/ D AT P .P/ C P .P/ A P .P/ B.R.P/ /1 B T P .P/ C Q.P/ .P/

P .P/ C.R.E/ /1 C T P .E/ P .E/ C.R.E//1 C T P .P/ x; P .P/ .T / D QF

(72) Furthermore, differentiation of (71) yields P D 2PP .E/ x C 2P .E/ xP

(73)

Inserting (70) into (72) and using Ansatz E yield 1 P D 2PP .E/ x C 2P .E/ Ax B.R.P/ /1 B T P .P/ x C C.R.E//1 C T 2

D 2PP .E/ x C 2P .E/ Ax B.R.P/ /1 B T P .P/ x C.R.E/ /1 C T P .E/ x

(74)

Next, inserting the expression (74) for P into (69) and reusing Ansatz E yield PP .E/ D AT P .E/ C P .E/ A P .E/ C.R.E/ /1 C T P .E/ Q.E/ .E/

P .E/ B.R.P/ /1 B T P .P/ P .P/ B.R.P/ /1 B T P .E/ ; P .E/ .T / D QF (75) We have obtained a system of coupled Riccati equations, (72) and (75), which is identical to (27) and (28). The solution of the system of Riccati equations (27) and (28) yields the optimal strategies u .t; x/ D .R.P/ /1 B T P .P/ .t/x

The Role of Information in Nonzero-Sum Differential Games

301

and v .tI x0 / D .R.E/ /1 C T P .E/ .t/x .t/ Having obtained the solution of Riccati systems (27) and (28), the optimal trajectory x .t/ is given by the solution of the linear differential equation

xP D A B.R.P/ /1 B T P .P/ .t/ C C.R.E/ /1 C T P .E/ .t/ x ; x .0/ D x0 Remark 1. The above alluded to symmetrization step yields symmetric Riccati equations (72) and (75), for otherwise “new” Riccati equations are obtained, as in [9]. We shall use the following notation. In the game where P plays closed-loop and E plays open-loop we denote the solution of the system of Riccati equations (27) and .P/ .E/ (28) by PCO .t/ and PCO .t/. Conversely, if P plays open-loop and E plays closedloop, the system of Riccati equations (27) and (28) is re-derived and its solution is .P/ .E/ then denoted by POC .t/ and POC .t/. In both cases, the system of Riccati equations is the system (27) and (28) which pertains to the case where both players use closedloop strategies and the solution P .P/ .t/ and P .E/ .t/ of (27) and (28) is denoted by .P/ .E/ PC C .t/ and PC C .t/, respectively. In summary, the following holds. Proposition 3. In nonzero-sum open-loop/closed-loop and closed-loop/open-loop LQ differential games, the players’ values are equal to the players’ values in the game where both players use closed-loop strategies—in other words, .P/

.P/

.E/

.E/

.P/

.P/

.E/

.E/

POC .t/ D PC C .t/ D P .P/ .t/ and POC .t/ D PC C .t/ D P .E/ .t/ Similarly, PCO .t/ D PC C .t/ D P .P/ .t/ and PCO .t/ D PC C .t/ D P .E/ .t/ 8 0 t T. Also recall that for the case where both P and E play open-loop, the solution of .P/ .E/ the Riccati system (57) and (58), denoted by POO .t/ and POO .t/, applies.

302

M. Pachter and K. Pham

6.1 Discussion When P plays closed-loop, the players’ values are as in the closed-loop differential game where both players use closed-loop strategies, that is, V .P/ .t; x/ D .P/ .E/ x T PC C .t/x D x T P .P/ .t/x and V .E/ .t; x/ D x T PC C .t/x D x T P .E/ .t/x— irrespective of whether player E plays open-loop or closed-loop. The converse is also true: when E plays closed-loop, the players’ values are as in the closed-loop differential game, irrespective of whether player P plays open-loop or closed-loop. However, it is advantageous for both players to play open-loop; their values/costs are reduced compared to the case where they both play closed-loop: .P/

.P/

.E/

.E/

POO .t/ < PC C .t/ and POO .t/ < PC C .t/ If however just one of the players plays open-loop and his opponent plays closedloop, then both players’ values are the higher closed-loop values.

7 Conclusion In this article nonzero-sum differential games are addressed. When nonzero-sum games are considered, there is no reason to believe that strategies might exist s.t. all the players are able to minimize their own cost and the natural optimality concept is the Nash equilibrium (NE). Now, the NE concept is somewhat problematic, because, first of all, it is not necessarily unique. If the NE is unique, the definition of NE strategy is appealing: by definition, a player’s NE strategy is s.t. should he not adhere to it while his opposition does stick to its NE strategy, his cost will increase and he will be penalized. Thus, assuming that the opposition will in fact execute its NE strategy, a player will be wise to adhere to his NE strategy. Note however that this is not to say that by having all parties deviate from their respective NE strategies, they would not all do better—think of the Prisoner’s Dilemma game. Now, in the special case of zero-sum games, the NE is a saddle point: hence, an NE strategy is a security strategy, the value of the game is unique, and the uniqueness of optimal strategies is not an issue because they are interchangeable. Evidently, nonzero-sum games are more complex than zero-sum games. This is even more so when dynamic games, and, in particular, nonzero-sum differential games, are addressed. In this article the open-loop and closed-loop information patterns in nonzero-sum differential games are examined. The results are specialized with reference to LQ differential games. It is explicitly shown that in LQ differential games, somewhat paradoxically, openloop NE strategies are superior to closed-loop NE strategies. Moreover, even if only

The Role of Information in Nonzero-Sum Differential Games

303

one party employs closed-loop control, both players’ values are the inferior values of the game where both players employ closed-loop strategies. This state of affairs can be attributed to the inherent weakness of the NE solution concept, which is not apparent in zero-sum differential games.

References 1. Case, J.H.: Equilibrium Points of N-Person Differential Games, University of Michigan, Department of industrial Engineering, TR No 1967–1, (1967) 2. Case, J.H.: Toward a theory of many player differential games. SIAM J. Control 7(2), 179–197 (1969) 3. Starr, A.W., Ho, Y.C.: Nonzero-sum differential games. J. Optimiz. Theory. App. 3(3), 184–206 (1969) 4. Starr, A.W., Ho, Y.C.: Further properties of nonzero-sum differential games. J. Optimiz. Theory. App. 3(4), 207–218 (1969) 5. Byung-Wook Wie: A differential game model of nash equilibrium on a congested traffic network. Networks 23(6), 557–565 (1993) 6. Byung-Wook Wie: A differential game approach to the dynamics of mixed behavior traffic network equilibrium problem. Eur. J. Oper. Res. 83, 117–136 (1995) 7. Olsder, G.J.: On open and closed-loop bang-bang control in nonzero-sum differential games. SIAM J. Control Optim. 40(4), 1087–1106 (2002) 8. Basar, T., Olsder G.J.: Dynamic Noncooperative Game Theory. SIAM, London, UK (1999) 9. Engwerda, J.C: LQ Dynamic Optimization and Differential Games. Wiley, Chichester, UK (2005)

Information Considerations in Multi-Person Cooperative Control/Decision Problems: Information Sets, Sufficient Information Flows, and Risk-Averse Decision Rules for Performance Robustness Khanh D. Pham and Meir Pachter

Abstract The purpose of this research investigation is to describe the main concepts, ideas, and operating principles of stochastic multi-agent control or decision problems. In such problems, there may be more than one controller/agent not only trying to influence the continuous-time evolution of the overall process of the system, but also being coupled through the cooperative goal for collective performance. The mathematical treatment is rather fundamental; the emphasis of the article is on motivation for using the common knowledge of a process and goal information. The article then starts with a discussion of sufficient information flows with a feedforward structure providing coupling information about the control/decision rules to all agents in the cooperative system. Some attention has been paid to the design of decentralized filtering via constrained filters for the multi-agent dynamic control/decision problem considered herein. The main focus is on the synthesis of decision strategies for reliable performance. That is on mathematical statistics associated with an integral-quadratic performance measure of the generalized chisquared type, which can later be exploited as the essential commodity to ensure much of the design-in reliability incorporated in the development phase. The last part of the article gives a comprehensive presentation of the broad and still developing area of risk-averse controls. It is possible to show that each agent with

K.D. Pham Air Force Research Laboratory, Space Vehicles Directorate, Kirtland Air Force Base, Albuquerque, NM 87117, USA e-mail: [email protected] M. Pachter () Air Force Institute of Technology, Department of Electrical and Computer Engineering, Wright-Patterson Air Force Base, Dayton, OH 45433, USA e-mail: [email protected] 305 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 16, © Springer Science+Business Media New York 2012

306

K.D. Pham and M. Pachter

risk-averse attitudes not only adopts the use of a full-state dimension and linear dynamic compensator driven by local measurements, but also generates cooperative control signals and coordinated decisions. Keywords Stochastic multi-agent cooperative control/decision problems • Performance-measure statistics • Performance reliability • Risk-averse control decisions • Matrix minimum principle • Necessary and sufficient conditions

1 Introduction Throughout the article, the superscript T in the notation is denoted for the transposition of vector or matrix entities. In addition, .˝; F; F; P/ is a complete filtered probability space and a standard p-dimensional Wiener process w.t/ w.t; !/ and ! 2 ˝ with the correlation of independent increments given by EfŒw.t1 / w.t2 /Œw.t1 / w.t2 /T g D W jt1 t2 j, W > 0 for all t1 ; t2 2 Œ0; T and w.0/ D 0 which generates the filtration F , Ft and Ft D fw.s/ W 0 s tg augmented by all P-null sets in F . Consider the following controlled stochastic problem: dx.t/ D f .t; x.t/; u.t//dt C g.t/dw.t/;

t 2 Œ0; T

x.0/ D x0

(1)

and a performance measure Z

T

J.u.// D

q.t; x.t/; u.t//dt C h.x.T // :

(2)

0

Here, x.t/ x.t; !/ is the controlled state process valued in Rn , u.t/ u.t; !/ is the control process valued in some set U Rm bounded or unbounded and g.t/ g.t; !/ is an n p matrix, ! 2 ˝. In the setting (1)–(2), f .t; x; u; !/ W R Rn Rm ˝ 7! Rn , q.t; x; u; !/ W R Rn Rm ˝ 7! R and h.x/ W Rn 7! R are given measurable functions. It is assumed that the random functions f .t; x; u; !/ and q.t; x; u; !/ are continuous for fixed ! 2 ˝ and are progressively measurable with respect to Ft for fixed .x; u/. The function h.x/ W Rn 7! R is continuous. To best explain the sort of applications to be addressed for the stochastic control problem (1)–(2), it is commenced by giving a brief description of stochastic multiagent cooperative decision and control problems of more than one controllers and/or agents, who not only try to influence the continuous-time evolution of the overall controlled process with local imperfect measurements but also coordinate actions through the same performance measure. In such a partially decentralized situation, u./ , .u1 ./; : : : ; uN .// of which ui ./ is the extreme control of the i th controller or agent, valued in Ui Rmi with m1 C C mN D m, and is to be chosen to

Information Considerations in Multi-Person Cooperative Control...

307

optimize expected values and variations of J.u.//. Furthermore, it seems unlikely that a closed-loop solution will be available in closed-form for this stochastic multi-agent cooperative control and/or decision problem except, possibly, under the structural constraints of linear system dynamics, quadratic cost functionals, and additive independent white Gaussian noises corrupting the system dynamics and measurements. For this reason, attention in this research investigation is directed primarily toward the stochastic control and/or decision problem with multiple agents, which has linear system dynamics, quadratic cost functionals, and uncorrelated standard Wiener process noises additively corrupting the controlled system dynamics and output measurements. Notice that under these conditions the quadratic cost functional associated with this problem class is a random variable with the generalized chi-squared probability distributions. If a measure of uncertainty, such as the variance of the possible outcome, was used in addition to the expected outcome, then the agents should be able to correctly order preferences for alternatives. This claim seems plausible, but it is not always correct. Various investigations have indicated that any evaluation scheme based on just the expected outcome and outcome variations would necessarily imply indifference between some courses of action; therefore, no criterion based solely on the two attributes of means and variances can correctly represent their preferences. See [1, 2] for early important observations and findings. As will be clear in the research development herein, the shape and functional form of a utility function tell us a great deal about the basic attitudes of the agents or decision makers toward the uncertain outcomes or performance risks. Of particular interest, the new utility function or the so-called risk-value aware performance index, which is proposed herein as a linear manifold defined by a finite number of centralized moments associated with a random performance measure of integral quadratic form, will provide a convenient allocation representation of apportioning performance robustness and reliability requirements into the multiattribute requirement of qualitative characteristics of expected performance and performance risks. The technical approach to a solution for the stochastic multiagent cooperative control or decision problem under consideration and its research contributions rest upon: (a) the acquisition and utilization of insights, regarding whether the agents are risk averse or risk prone and thus restrictions on the utility functions implied by these attitudes and (b) the adaptation of decision strategies to meet difficult environments, as well as best courses of action to ensure performance robustness and reliability, provided that the agents be subscribed to certain attitudes. The rest of the article is organized as follows. In Sect. 2 the stochastic two-agent cooperative problem with the linear-quadratic structure is formulated. Section 3 is devoted to decentralized filtering via constrained filters derived for cooperative agents with different information patterns. In addition, the mathematical analysis of higher-order statistics associated with the performance-measure is of concern in Sect. 4. Section 5 applies the first- and second-order conditions of the matrix minimum principle for optimal controls of the stochastic cooperative problem. Finally, Sect. 6 gives some concluding remarks.

308

K.D. Pham and M. Pachter

Agent 1

A1 x^ 1(t0)

D1

∑

∑

∫

x^ 1(t)

K1

u1 (t)

L1 v1(t)

x(t0) u1 (t)

u2 (t)

B1

x(t) ∫

∑

B2

∑

A

C1

∑

C2

∑

z1(t)

z2(t)

v2(t) Agent 2

L2 x^ 2(t0)

D2

∫

∑

x^ 2(t)

∑

K2

u2 (t)

A2

Fig. 1 Interaction architecture of a stochastic multi-agent cooperative system

2 Problem Formulation and Preliminaries In this section, some preliminaries are in order. First of all, some spaces of random variables and stochastic processes are introduced ˚ ˚ L2Ft .˝I Rn / , W ˝ 7! Rn j is Ft -measurable, E jjjj2 < 1 ; 2 k LF .0; T I R / , f W Œ0; T ˝ 7! Rk jf ./ is F-adapted, Z

T

E

2

jjf .t/jj dt

0 V2 > 0

whose a priori second-order statistics V1 and V2 are also assumed known to both agents. For simplicity, both agents consider the initial state x.0/ to be known. Associated with each .u1 ; u2 / 2 U1 U2 is a path-wise finite-horizon integralquadratic form (IQF) performance measure with the generalized chi-squared random distribution, for which both agents attempt to coordinate their actions J.u1 ./; u2 .// D x T .T /QT x.T / Z T T C x .t/Q.t/x.t/ C uT1 .t/R1 .t/u1 .t/ C uT2 .t/R2 .t/u2 .t/ dt 0

(6) where the terminal penalty weighting QT 2 Rnn , the state weighting Q.t/ Q.t; !/ W Œ0; T ˝ 7! Rnn and control weightings R1 .t/ R1 .t; !/ W Œ0; T ˝ 7! Rm1 m1 and R2 .t/ R2 .t; !/ W Œ0; T ˝ 7! Rm2 m2 are continuous-time matrix functions with the properties of symmetry and positive semi-definiteness. In addition, R1 .t/ and R2 .t/ are invertible. Denote by Yi and i D 1; 2 the output functions measured by agents up to time t Yi .t/ , f.; yi .//I 2 Œ0; t/g ;

i D 1; 2 :

310

K.D. Pham and M. Pachter

Then the information structure is defined as follows: Zi .t/ , Yi .t/ [ fa priori informationg : Notice that the information structures Zi .t/ and i D 1; 2 include the a priori information available to agents so that in particular, either Zi .0/ is simply the a priori information when either of them has no output measurements at all.

3 Decentralized Filtering via Constrained Filters This work is concerned with decentralized filtering where each agent is constrained to make local noise state measurements. No exchange of online information is allowed, and each agent must generate its own online control decisions based upon its local processing resources. As an illustration, the information describing the system of the form (3)–(5) can be naturally grouped into three classes: (i) local model data, IMDi .t/ , fA.t/; Bi .t/; G.t/; Ci .t/g; (ii) local process data of statistical parameters concerning the stochastic processes, IPDi , fx0 ; W; Vi g; and (iii) online data available from local measurements, IODi .t/ , fyi .t/g with i D 1; 2 and t 2 Œ0; T . Hence, the information flow, as defined by Ii .t/ , IMDi .t/ [ IPDi [ IODi .t/, is available at agent i ’s location. Next, a simple class of implementable filter structures is introduced for the case of distributed information flows herein. Subsequently, instead of allowing each agent to preserve and use the entire output function that it has measured up to the time t, agent i is now restricted to generate and use only a vector-valued function that satisfies a linear, nth order dynamic system, which also gives unbiased estimates dxO i .t/ D .Ai .t/xO i .t/ C Di .t/ui .t//dt C Li .t/dyi .t/ ;

i D 1; 2

(7)

wherein the continuous-time matrices Ai .t/ Ai .t; !/ W Œ0; T ˝ 7! Rnn , Di .t/ Di .t; !/ W Œ0; T ˝ 7! Rnmi , Li .t/ Li .t; !/ W Œ0; T ˝ 7! Rnri and the initial condition xO i .0/ are to be selected by agent i while the expected value of the current state x.t/ given the measured output function Yi .t/ is denoted by xO i .t/. Notice that the filter (7), as proposed here is not the Stratonovich–Kalman– Bucy filter although it is linear and unbiased. The decentralized filtering problem is to determine matrix coefficients Ai ./, Di ./, Li ./, and initial filter states such that xO i .t/ are unbiased estimates of x.t/ for all ui .t/ and i D 1; 2. With respect to the structures of online dynamic control as considered in Fig. 1, practical control decisions with feedback ui D ui .t; Zi .t// for agent i and i D 1; 2 are reasonably constrained to be linear transformations of unbiased estimates from the linear filters driven by the local measurements (7) ui .t/ D ui .t; xO i .t// , Ki .t/xO i .t/ ;

i D 1; 2

(8)

Information Considerations in Multi-Person Cooperative Control...

311

where the decision control gains Ki .t/ D Ki .t; !/ W Œ0; T ˝ 7! Rmi n will be appropriately defined such that the corresponding set Ui of admissible controls consisting of all functions ui .t; !/ W Œ0; T ˝ 7! Rmi , which are progressively RT measurable with respect to Ft and Ef 0 jjui .t; !/jj2 dtg < 1. Using (3), (7), and (8) it is easily shown that the estimation errors satisfy dx.t/ dxO 1 .t/ D .A.t/ A1 .t/ C B2 .t/K2 .t/ L1 .t/C1 .t//x.t/dt B2 .t/K2 .t/.x.t/ xO 2 .t//dt C A1 .t/.x.t/ xO 1 .t//dt C .B1 .t/ D1 .t//K1 .t/xO 1 .t/dt C G.t/dw.t/ L1 .t/dv1 .t/ (9) dx.t/ dxO 2 .t/ D .A.t/ A2 .t/ C B1 .t/K1 .t/ L2 .t/C2 .t//x.t/dt B1 .t/K1 .t/.x.t/ xO 1 .t//dt C A2 .t/.x.t/ xO 2 .t//dt C .B2 .t/ D2 .t//K2 .t/xO 2 .t/dt C G.t/dw.t/ L2 .t/dv2 .t/ : (10) Furthermore, it requires to have both xO 1 .t/ and xO 2 .t/ to be unbiased estimates of x.t/ for all u1 .t/ and u2 .t/, that is, for all t 2 Œ0; T , i D 1; 2 and j D 1; 2 Efx.t/ xO i .t/jZj .t/g D 0:

(11)

Now if the requirement (11) is satisfied, then for each t it follows that Efdx.t/ dxO i .t/jZj .t/g D 0 ;

i D 1; 2 ;

j D 1; 2:

(12)

Hence, from (9), (10), and the fact that w.t/ and vi .t/ with i D 1; 2 are the zeromean random processes the necessary conditions for unbiased estimates then are A1 .t/ D A.t/ C B2 .t/K2 .t/ L1 .t/C1 .t/

(13)

A2 .t/ D A.t/ C B1 .t/K1 .t/ L2 .t/C2 .t/

(14)

D1 .t/ D B1 .t/

(15)

D2 .t/ D B2 .t/ :

(16)

In addition, letting t D 0 in (11) results in the condition xO i .0; !/ D x0 ;

8! 2 ˝;

i D 1; 2:

(17)

On the other hand, using conditions (13)–(17) together with expressions (9) and (10) it follows that for t 2 Œ0; T and j D 1; 2

312

K.D. Pham and M. Pachter

Efdx.t/ dxO 1 .t/jZj .t/g D A1 .t/Efx.t/ xO 1 .t/jZj .t/gdt B2 .t/K2 .t/Efx.t/ xO 2 .t/jZj .t/gdt Efdx.t/ dxO 2 .t/jZj .t/g D A2 .t/Efx.t/ xO 2 .t/jZj .t/gdt B1 .t/K1 .t/Efx.t/ xO 1 .t/jZj .t/gdt and ˇ ˇ Efx.t/ x.t/jZ O j .t/g t D0 D 0 : Therefore, the conditions (13)–(17) are also sufficient for unbiased estimates. Henceforth, the class of decentralized filtering via constrained filters is characterized by the stochastic differential equation together with i D 1; 2, j D 1; 2, and j ¤ i dxO i .t/ D Œ.A.t/ C Bj .t/Kj .t//xO i .t/ C Bi .t/ui .t/dt C Li .t/.dyi Ci .t/xO i .t// xO i .0/ D x0

(18)

wherein the filter gain Li .t/ remains to be chosen by agent i in an optimal manner relative to the collective performance measure defined in (6).

4 Mathematical Statistics for Collective Performance Robustness To progress toward the cooperation situation, the aggregate dynamics composing of agent interactions, distributed decision making and local autonomy are, therefore, governed by the controlled stochastic differential equation O dz.t/ D FO .t/z.t/dt C G.t/d w.t/ O ;

z.0/ D z0

(19)

in which for each t 2 Œ0; T , the augmented state variables, the underlying process noises, and the system coefficients are given by 2

3 x z , 4 x xO 1 5 ; x xO 2

2

3 x0 z0 , 4 0 5 ; 0

3 w wO , 4 v1 5 v2 2

Information Considerations in Multi-Person Cooperative Control...

313

and 2

3 A C B1 K1 C B2 K2 B1 K1 B2 K2 5 FO , 4 0 A C B2 K2 L1 C1 B2 K2 0 B1 K1 A C B1 K1 L2 C2 2 3 2 3 G 0 0 W 0 0 GO , 4 G L1 0 5 ; WO , 4 0 V1 0 5 G 0 L2 0 0 V2

(20)

(21)

O 2 /Œw.t O 1 / w.t O 2 /T g D WO jt1 t2 j for all t1 ; t2 2 Œ0; T . with EfŒw.t O 1 / w.t Moreover, the pairs .A./; Bi .// and .A./; Ci .// for i D 1; 2 are assumed to be uniformly stabilizable and detectable, respectively. Under this assumption, such feedback and filter gains Ki ./ and Li ./ for i D 1; 2 exist so that the aggregate system dynamics is uniformly exponentially stable. In other words, there exist positive constants 1 and 2 such that the pointwise matrix norm of the state transition matrix of the closed-loop system matrix FO ./ satisfies the inequality jj˚FO .t; /jj 1 e 2 .t / ;

8t 0:

(22)

In most of the type of problems under consideration and available results in team theory [3] and large-scale systems [4], it is apparent that there is lack of analysis of performance risk and stochastic preferences beyond statistical averaging. Henceforth, the following development is vital to examine what it means for performance riskiness from the standpoint of higher-order characteristics pertaining to performance sampling distributions. Specifically, for each admissible tuple .K1 ./; K2 .//, the path-wise performance measure (6), which contains trade-offs between dynamic agent coordination and system performance, is now rewritten as J.K1 ./; K2 .// D z .T /NO T z.T / C T

Z

T

zT .t/NO .t/z.t/dt

(23)

0

where the positive semi-definite terminal penalty NO T 2 R3n3n and positive definite transient weighting NO .t/ D NO .t; !/ W Œ0; T ˝ 7! R3n3n are given by 2

3 3 2 T QT 0 0 K1 R1 K1 C K2T R2 K2 C Q K1T R1 K1 K2T R2 K2 5 NO T , 4 0 0 0 5 ; NO , 4 K1T R1 K1 K1T R1 K1 0 T T K2 R2 K2 0 K2 R2 K2 0 00 (24) So far there are two types of information, that is, process information (19)–(21) and goal information (23)–(24) have been given in advance to cooperative agents 1 and 2. Because there is random disturbance of the process w./ O affecting the overall

314

K.D. Pham and M. Pachter

performance, both cooperative agents now need additional information about performance variations. This is coupling information and thus also known as performance information. It is natural to further assume that cooperative agents are risk averse. They both prefer to avoid the risks associated with collective performance. And, for the reason of measure of effectiveness, much of the discussion that follows will be concerned with the situation where cooperative agents have risk-averse attitudes toward all process random realizations. Regarding the linear-quadratic structural constraints (19) and (23), the path-wise performance measure (23) with which the cooperative agents are coordinating their actions is clearly a random variable of the generalized chi-squared type. Hence, the degree of uncertainty of the path-wise performance measure (23) must be assessed via a complete set of higher-order statistics beyond the statistical mean or average. The essence of information about these higher-order performance-measure statistics in an attempt to describe or model performance uncertainty is now considered as a source of information flow, which will affect perception of the problem and the environment at each cooperative agent. Next, the question of how to characterize and influence performance information is answered by modeling and management of cumulants (also known as semi-invariants) associated with (23) as shown in the following result. Theorem 1 Let z./ be a state variable of the stochastic cooperative dynamics (19) with initial values z./ z and 2 Œ0; T . Further let the moment-generating function be denoted by ˚ ' .; z ; / D % .; / exp zT .; /z

(25)

2 RC :

(26)

.; / D lnf% .; /g ;

Then the cumulant-generating function has the form of quadratic affine .; z ; / D zT .; /z C .; /

(27)

where the scalar solution .; / solves the backward-in-time differential equation o n d .; / D Tr .; /GO ./ WO GO T ./ ; d

.T; / D 0

(28)

and the matrix solution .; / satisfies the backward-in-time differential equation d .; / D FO T ./ .; / .; /FO ./ d O WO GO T ./ .; / NO ./; 2 .; /G./

.T; / D NO f : (29)

Information Considerations in Multi-Person Cooperative Control...

315

Meanwhile, the scalar solution %./ satisfies the backward-in-time differential equation n o d % .; / D % .; / Tr .; /GO ./ WO GO T ./ ; d

% .T; / D 1 :

(30)

Proof. For notional simplicity, it is convenient to have $ .; z ; / , exp fJ .; z /g in which the performance measure (23) is rewritten as the costto-go function from an arbitrary state z at a running time 2 Œ0; T , that is, J.; z / D zT .T /NO T z.T / C

Z

T

zT .t/NO .t/z.t/dt

(31)

subject to O dz.t/ D FO .t/z.t/dt C G.t/d w.t/ O ;

z./ D z :

(32)

By definition, the moment-generating function is '.; z ; / , E f$ .; z ; /g. Thus, the total time derivative of '.; z ; / is obtained as d ' .; z ; / D ' .; z ; / zT NO ./z : d Using the standard Ito’s formula, it follows d' .; z ; / D E fd$ .; z ; /g n o o 1 n O WO GO T ./ d ; D E $ .; z ; / dC$z .; z ; / dz C Tr $z z .; z ; /G./ 2 o 1 n O WO GO T ./ d D ' .; z ; /d C 'z .; z ; /FO ./z d C Tr 'z z .; z ; /G./ 2 ˚ which under the hypothesis of ' .; z ; / D % .; / exp xT a .; /x and its partial derivatives "

# d ' .; z ; / D ' .; z ; / C .; /z %.; / d 'z .; z ; / D ' .; z ; / zT .; / C T .; / 'z z .; x ; / D ' .; z ; / .; / C T .; / C ' .; z ; / .; / C T .; / z zT .; / C T .; / d %.; / d

zT

316

K.D. Pham and M. Pachter

leads to the result d % .; / d ' .; z ; / C ' .; z ; / zT .; /z ' .; z ; / zT NO ./z D d % .; / d h i C ' .; z ; / zT FO T ./ .; / C .; /FO ./ z h O WO GO T ./ .; /z C ' .; z ; / 2zT .; /G./ n oi O WO GO T ./ : CTr .; /G./

To have constant and quadratic terms being independent of arbitrary z , it requires d O WO GO T ./ .; / NO ./ .; / D FO T ./ .; / .; /FO ./ 2 .; /G./ d o n d O WO GO T ./ %.; / D % .; / Tr .; /G./ d

with the terminal-value conditions .T; / D NO T and %.T; / D 1. Finally, the backward-in-time differential equation satisfied by .; / is obtained n o d O WO GO T ./ ; .; / D Tr .; /G./ d

.T; / D 0 :

t u

As it turns out that all the higher-order characteristic distributions associated with performance uncertainty and risk are very well captured in the higher-order performance-measure statistics associated with (31). Subsequently, higher-order statistics that encapsulate the uncertain nature of (31) can now be generated via a MacLaurin series of the cumulant-generating function (27) ˇ 1 X ˇ @.r/ r r ˇ .; z ; / , D r .z / .; z ; / ˇ rŠ @ .r/ D0 rŠ rD1 rD1 1 X

(33)

in which r .z /’s are called performance-measure statistics. Moreover, the series expansion coefficients are computed by using the cumulant-generating function (27) ˇ ˇ ˇ .r/ ˇ ˇ ˇ @.r/ @.r/ T @ ˇ ˇ .; z ; /ˇ D z .; /ˇ z C .; /ˇˇ : .r/ .r/ @ .r/ @ @ D0 D0 D0

(34)

In view of the definition (33), the rth performance-measure statistic therefore follows ˇ ˇ ˇ ˇ @.r/ @.r/ ˇ ˇ .; / z C .; / (35) r .z / D zT ˇ ˇ .r/ .r/ @ @ D0 D0

Information Considerations in Multi-Person Cooperative Control...

317

for any finite 1 r < 1. For notational convenience, the following change of notations: ˇ ˇ ˇ ˇ @.r/ @.r/ ˇ .; /ˇ and Dr ./ , .; /ˇˇ (36) Hr ./ , .r/ .r/ @ @ D0 D0 are introduced so that the next theorem provides an effective and accurate capability for forecasting all the higher-order characteristics associated with performance uncertainty. Therefore, via higher-order performance-measure statistics and adaptive decision making, it is anticipated that future performance variations will lose the element of surprise due to the inherent property of self-enforcing and risk-averse decision solutions that are readily capable of reshaping the cumulative probability distribution of closed-loop performance. Theorem 2 Performance-Measure Statistics Let the stochastic two-agent cooperative system be described by (19) and (23) in which the pairs .A; B1 / and .A; B2 / are uniformly stabilizable and the pairs .A; C1 / and .A; C2 / are uniformly detectable. For k 2 N fixed, the kth cumulant of performance measure (23) is given by k .z0 / D zT0 Hk .0/z0 C Dk .0/

(37)

where the supporting variables fHr ./gkrD1 and fDr ./gkrD1 evaluated at D 0 satisfy the differential equations (with the dependence of Hr ./ and Dr ./ upon K1 ./, K2 ./, L1 ./ and L2 ./ suppressed) d H1 ./ D FO T ./H1 ./ H1 ./FO ./ NO ./ d d Hr ./ D FO T ./Hr ./ Hr ./FO ./ d

r1 X sD1

2rŠ O WO GO T ./Hrs ./ ; Hs ./G./ sŠ.r s/Š

n o d O WO GO T ./ ; Dr ./ D Tr Hr ./G./ d

1r k

(38)

2 r k (39) (40)

where the terminal-value conditions H1 .T / D NO T , Hr .T / D 0 for 2 r k and Dr .T / D 0 for 1 r k. Proof. The expression of performance-measure statistics described in (37) is readily justified by using result (35) and definition (36). What remains is to show that the solutions Hr ./ and Dr ./ for 1 r k indeed satisfy the dynamical equations (38)–(40). Notice that the dynamical equations (38)–(40) are satisfied by the solutions Hr ./ and Dr ./ and can be obtained by successively taking time

318

K.D. Pham and M. Pachter

derivatives with respect to of the supporting equations (28)–(29) together with the assumption of .A; B1 / and .A; B2 / being uniformly stabilizable on Œ0; T . t u

5 Cooperative Decision Strategies with Risk Aversion The purpose of this section is to provide statements of the optimal statistical control with the addition of the necessary and sufficient conditions for optimality for the stochastic two-agent cooperative control and decision problem that are considered in this research investigation. The optimal statistical control of stochastic twoagent cooperative systems herein is distinguished by the fact that the evolution in time of all mathematical statistics (37) associated with the random performance measure (23) of the generalized chi-squared type are naturally described by means of matrix differential equations (38)–(40). For such problems it is important to have a compact statement of the optimal statistical control so as to aid mathematical manipulation. To make this more precise, one may think of the k-tuple state variables H./ , .H1 ./; : : : ; Hk .// and D./ , .D1 ./; : : : ; Dk .// whose continuously differentiable states Hr 2 C 1 .Œ0; T I R3n3n / and Dr 2 C 1 .Œ0; T I R/ having the representations Hr ./ , Hr ./ and Dr ./ , Dr ./ with the right members satisfying the dynamics (38)–(40) are defined on Œ0; T . In the remainder of the development, the convenient mappings are introduced as follows Fr W Œ0; T .R3n3n /k 7! R3n3n Gr W Œ0; T .R3n3n /k 7! R where the rules of action are given by F1 .; H/ , FO T ./H1 ./ H1 ./FO ./ NO ./ Fr .; H/ , FO T ./Hr ./ Hr ./FO ./ r1 X

2rŠ O WO GO T ./Hrs ./ ; Hs ./G./ sŠ.r s/Š sD1 n o O WO GO T ./ ; Gr .; H/ , Tr Hr ./G./ 1 r k:

2r k

The product mappings that follow are necessary for a compact formulation F1 Fk W Œ0; T .R3n3n /k 7! .R3n3n /k G1 Gk W Œ0; T .R3n3n /k 7! Rk

Information Considerations in Multi-Person Cooperative Control...

319

whereby the corresponding notations F , F1 Fk and G , G1 Gk are used. Thus, the dynamic equations of motion (38)–(40) can be rewritten as d H./ D F .; H.//; H.T / HT (41) d d (42) D./ D G .; H.// ; D.T / DT d where k-tuple values HT , NO T ; 0; : : : ; 0 and DT D .0; : : : ; 0/. Notice that the product system uniquely determines the state matrices H and D once the admissible feedback gain K1 and K2 together with admissible filtering gains L1 and L2 being specified. Henceforth, these state variables will be considered as H H.; K1 ; K2 ; L1 ; L2 / and D D.; K1 ; K2 ; L1 ; L2 /. The performance index in optimal statistical control problems can now be formulated in K1 , K2 , L1 , and L2 . For the given terminal data .T; HT ; DT /, the classes of admissible feedback and filter gains are next defined. Definition 1 Admissible Filter and Feedback Gains Let compact subsets Li Rnri and K i Rmi n and i D 1; 2 be the sets of allowable filter and feedback gain values. For the given k 2 N and sequence D f r 0gkrD1 with 1 > 0, the set of admissible filter gains LiT;HT ;DT I and feedback i gains KT;H are, respectively, assumed to be the classes of C.Œ0; T I Rnri / and T ;DT I

C.Œ0; T I Rmi n / with values Li ./ 2 Li and Ki ./ 2 K i for which solutions to the dynamic equations (41)–(42) with the terminal-value conditions H.T / D HT and D.T / D DT exist on the interval of optimization Œ0; T . It is now crucial to plan for robust decisions and performance reliability from the start because it is going to be much more difficult and expensive to add reliability to the process later. To be used in the design process, performance-based reliability requirements must be verifiable by analysis; in particular, they must be measurable, like all higher-order performance-measure statistics, as evidenced in the previous section. These higher-order performance-measure statistics become the test criteria for the requirement of performance-based reliability. What follows is risk-value aware performance index in the optimal statistical control. It naturally contains some trade-offs between performance values and risks for the subject class of stochastic decision problems. i On the Cartesian product LiT;HT ;DT I KT;H and i D 1; 2, the performance T ;DT I

index with risk-value considerations in the optimal statistical control is subsequently defined as follows. Definition 2 Risk-Value Aware Performance Index Fix k 2 N and the sequence of scalar coefficients D f r 0gkrD1 with 1 > 0. Then for the given z0 , the risk-value aware performance index 0 W .R3n3n /k Rk 7! RC

320

K.D. Pham and M. Pachter

pertaining to the optimal statistical control of the stochastic cooperative decision problem involved two agents over Œ0; T is defined by 0 .H; D/ ,

D

1 1 .z0 / C 2 2 .z0 / C C k k .z0 / ƒ‚ … „ ƒ‚ … „ Value Measure Risk Measures k X

r zT0 Hr .0/z0 C Dr .0/

(43)

rD1

where additional design freedom by means of r ’s utilized by cooperative agents are sufficient to meet and exceed different levels of performance-based reliability requirements, for instance, mean (i.e., the average of performance measure), variance (i.e., the dispersion of values of performance measure around its mean), skewness (i.e., the antisymmetry of the density of performance measure), kurtosis (i.e., the heaviness in the density tails of performance measure), etc., pertaining to closed-loop performance variations and uncertainties while the cumulantgenerating solutions fHr ./gkrD1 and fDr ./gkrD1 evaluated at D 0 satisfy the dynamical equations (41)–(42). Notice that the assumption of all r 0 with 1 > 0 and r D 1; : : : ; k in the definition of risk-averse performance index is assumed for strictly order preserving and well-posedness of the optimization at hand. This assumption, however, cannot be always justified, because human subjects are also well known to exhibit risktaking patterns in certain situations (e.g., when higher values of dispersion are preferred). Next, the optimization statement for the statistical control of the stochastic cooperative system for two agents over a finite horizon is stated. Definition 3 Optimization Problem Given 1 ; : : : ; k with 1 > 0, the optimization problem of the statistical control over Œ0; T is given by Li ./2LiT;H

0 .H; D/ ;

min T ;DT I

;Ki ./2KiT;H

i D 1; 2

(44)

T ;DT I

subject to the dynamical equations (41)–(42) for 2 Œ0; T . Opposite to the spirit of the earlier work by the authors [5, 6] relative to the traditional approach of dynamic programming to the optimization problem of Mayer form, the problem (44) of finding extremals may, however, be recast as that of minimizing the fixed-time optimization problem in Bolza form, that is, 0 .0; X / D Tr

˚

X .0/z0 zT0

Z

T

C 0

n o O WO GO T .t/ dt Tr X .t/G.t/

(45)

Information Considerations in Multi-Person Cooperative Control...

321

subject to d X ./ D FO T ./X ./ X ./FO ./ 1 NO ./ d

k X

r

rD2

r1 X sD1

2rŠ O WO GO T ./Hrs ./ ; Hs ./G./ sŠ.r s/Š

M.T / D 1 NO T

(46)

wherein X ./ , 1 H1 ./ C C k Hk ./ and fHr ./gkrD1 are satisfying the dynamical equations (38)–(40) for all 2 Œ0; T . Furthermore, the transformation of problem (45) and (46) into the framework required by the matrix minimum principle [7] that makes it possible to apply Pontryagin’s results directly to problems whose state variables are most conveniently regarded as matrices is complete if further changes of variables are introduced, that is, T t D and X .T t/ D M.t/. Thus, the aggregate equation (46) is rewritten as d M.t/ DFO T .t/M.t/ C M.t/FO .t/ C 1 NO .t/ dt C

k X rD2

r

r1 X sD1

2rŠ O WO GO T .t/Hrs .t/; Hs .t/G.t/ sŠ.r s/Š

M.0/ D 1 NO T : (47)

Now the matrix coefficients FO , NO , and GO WO GO T of the composite dynamics (19) for agent interaction and estimation are next partitioned to conform with the n-dimensional structure of (3) by means of I0T , I 0 0 ;

I1T , 0 I 0 ;

I2T , 0 0 I

where I is an n n identity matrix and FO D I0 AI0T C I1 AI1T C I2 AI2T C I0 B1 K1 .I0 I1 /T C I2 B1 K1 .I2 I1 /T C I0 B2 K2 .I0 I2 /T C I1 B2 K2 .I1 I2 /T I1 L1 C1 I1T I2 L2 C2 I2T (48) NO D .I0 I1 /K1TR1 K1 .I0 I1 /T C .I0 I2 /K2TR2 K2 .I0 I2 /T C I0 QI0T (49) GO WO GO T D I0 GW G T I1TCI1 GW G T I0TCI1 GW G T I1TC.I0 C I2 /GW G T .I0 CI2 /T C I1 L1 V1 LT1 I1T C I2 L2 V2 LT2 I2T :

(50)

322

K.D. Pham and M. Pachter

i Assume that LiT;HT ;DT I KT;H and i D 1; 2 are nonempty and convex in T ;DT I

1 2 nri mi n R . For all .t; K1 ; K2 ; L1 ; L2 / 2 Œ0; T KT;H KT;H R T ;DT I

T ;DT I

1 2 LT;HT ;DT I LT;HT ;DT I , the maps h.M/ and q.t; M.t; K1 ; K2 ; L1 ; L2 // having the property of twice continuously differentiable, as defined from the risk-value aware performance index (45)

0 .L1 ./; K1 ./; L2 ./; K2 .// Z T D h.M.T // C q.t; M.t; K1 .t/; K2 .t/; L1 .t/; L2 .t///dt 0

˚ D Tr M.T /z0 zT0 C

Z

T 0

n o O WO GO T .t/ dt Tr M.t/G.t/

(51)

are supposed to have all partial derivatives with respect to M up to order 2 being continuous in .M; K1 ; K2 ; L1 ; L2 / with appropriate growths. 1 2 Moreover, any 4-tuple .K1 ; K2 ; L1 ; L2 / 2 KT;H KT;H T ;DT I

T ;DT I

1 2 LT;HT ;DT I LT;HT ;DT I minimizing the risk-value aware performance index (51) is called optimal strategies with risk aversion of the optimization problem (44). The corresponding state process M ./ is called an optimal state process. Further denote P.t/ by the costate matrix associated with M.t/ for each t 2 Œ0; T . The scalar Hamiltonian function for the optimization problem (47) and (51) is thus defined by n

V.t; M; K1 ; K2 ; L1 ; L2 / ,Tr MGO WO G

C

k X rD2

OT

r

r1 X sD1

o

(" C Tr

FO T M C MFO C 1 NO

) # 2rŠ Hs GO WO GO T Hrs P T .t/ : sŠ.r s/Š (52)

whereby in view of (48)–(50), the matrix variables M, FO , NO , etc. shall be considered as M.t; K1 ; K2 ; L1 ; L2 /, FO .t; K1 ; K2 ; L1 ; L2 /, NO .t; K1 ; K2 /, etc., respectively. Using the matrix minimum principle [7], the set of first-order necessary conditions for K1 , K2 , L1 , and L2 to be extremizers is composed of ˇ @V ˇˇ d M .t/ D D .FO /T .t/M .t/ C M .t/FO .t/ C 1 NO .t/ dt @P ˇ C

k X rD2

r

r1 X sD1

2rŠ .t/ ; H .t/GO .t/WO .GO /T .t/Hrs sŠ.r s/Š s

M .0/ D 1 NO T (53)

Information Considerations in Multi-Person Cooperative Control...

323

and ˇ d @V ˇˇ P .t/ D D FO .t/P .t/ P .t/.FO /T .t/ GO .t/WO .GO /T .t/ dt @M ˇ P .T / D z0 zT0 :

(54)

In addition, if .K1 ; K2 ; L1 ; L2 / is a local extremum of (52), it implies that V.t; M .t/; K1 ; K2 ; L1 ; L2 / V.t; M .t/; K1 .t/; K2 .t/; L1 .t/; L2 .t// 0 (55) 1 2 KT;H L1T;HT ;DT I L2T;HT ;DT I and for all .K1 ; K2 ; L1 ; L2 / 2 KT;H T ;DT I

T ;DT I

t 2 Œ0; T . That is,

min

V.t; M .t/; K1 ; K2 ; L1 ; L2 /

.K1 ;K2 ;L1 ;L2 /2K1T;H ;D I K2T;H ;D I L1T;H ;D I L2T;H ;D I

T T T T T T T T

D V.t; M .t/; K1 .t/; K2 .t/; L1 .t/; L2 .t// D 0 ;

8 t 2 Œ0; T :

(56)

Equivalently, it follows that ˇ h i @V ˇˇ T T T 0 D 2B .t/ I M .t/P .t/.I I / C I M .t/P .t/.I I / 0 1 2 1 1 0 2 @K1 ˇ ˇ @V ˇˇ 0 @K2 ˇ

(57) C 2 1 R1 .t/K1 .I0 I1 /T P .t/.I0 I1 / h i D 2B2T .t/ I0T M .t/P .t/.I0 I2 / C I1T M .t/P .t/.I1 I2 / C 2 1 R2 .t/K2 .I0 I2 /T P .t/.I0 I2 /

ˇ @V ˇˇ D 2I1T M .t/P .t/I1 C1T .t/ C 2I1T M .t/I1 L1 V1 0 @L1 ˇ C2

k X

2

rD2

r1 X sD1

2rŠ I T H .t/P .t/Hrs .t/I1 L1 V1 sŠ.r s/Š 1 s

(58)

(59)

ˇ @V ˇˇ 0 D 2I2T M .t/P .t/I2 C2T .t/ C 2I2T M .t/I2 L2 V2 @L2 ˇ C2

k X rD2

2

r1 X sD1

2rŠ I T H .t/P .t/Hrs .t/I2 L2 V2 : sŠ.r s/Š 2 s

(60)

324

K.D. Pham and M. Pachter

Furthermore, the second-order sufficient conditions that ensure the Hamiltonian functional (52) achieving its local minimum, require the following Hessian matrices to be positive definite; in particular, ˇ @2 V ˇˇ D 2 1 R1 .t/ ˝ .I0 I1 /T P .t/.I0 I1 / (61) @K12 ˇ ˇ @2 V ˇˇ D 2 1 R2 .t/ ˝ .I0 I2 /T P .t/.I0 I2 / (62) @K22 ˇ " # ˇ k r1 X X @2 V ˇˇ 2rŠ T H .t/P .t/Hrs .t/ I1 ˝ V1 D 2I1 M .t/ C

r sŠ.r s/Š s @L21 ˇ rD2 sD1 (63) " # ˇ k r1 X X 2rŠ @2 V ˇˇ T M Hs .t/P .t/Hrs D 2I .t/ C

.t/ I2 ˝ V2 r 2 2ˇ sŠ.r s/Š @L2 rD2 sD1 (64) wherein ˝ stands for the Kronecker matrix product operator. By the matrix variation of constants formula [8], the matrix solutions of the cumulant-generating Eqs. (38)–(39) and the costate Eq. (54) can be rewritten in the integral forms, for each 2 Œ0; T Z T H1 ./ D ˚ T .T; /NO T ˚.T; / C ˚.T; t/NO .t/˚.T; t/dt (65)

Hr ./ D

Z

T

˚.T; t/

r1 X sD1

2rŠ H .t/GO .t/WO .GO /T .t/Hrs .t/˚.T; t/dt sŠ.r s/Š s (66)

P ./ D ˚ T .T; /z0 zT0 ˚.T; / C

Z

T

˚.T; t/GO .t/WO .GO /T .t/˚.T; t/dt (67)

provided that d ˚.t; 0/ D FO .t/˚.t; 0/; dt

˚.0; 0/ D I:

(68)

It can easily be verified that the following matrix inequalities hold for all t 2 Œ0; T NO T 0 r1 X sD1

NO ./ > 0 2rŠ H ./GO ./WO .GO /T ./Hrs ./ 0 sŠ.r s/Š s z0 zT0 0 GO ./WO .GO /T ./ > 0 :

Information Considerations in Multi-Person Cooperative Control...

325

Therefore, it implies that fHr ./gkrD1 and thus M ./, as well as P ./ with the integral forms (65)–(67), are positive definite on Œ0; T . Subsequently, one can show that the following matrix inequalities are valid

"

k X

r1 X

.I0 I1 /T P ./.I0 I1 / > 0

(69)

.I0 I2 /T P ./.I0 I2 / > 0 #

(70)

2rŠ Hs ./P ./Hrs ./ I1 > 0 sŠ.r s/Š rD2 sD1 # " k r1 X X 2rŠ T I2 M ./ C H ./P ./Hrs ./ I2 > 0 :

r sŠ.r s/Š s rD2 sD1 I1T M ./ C

r

(71)

(72)

In view of (69)–(72), all the Hessian matrices (61)–(64) are thus positive definite. As the result, the local extremizer .K1 ; K2 ; L1 ; L2 / formed by the first-order necessary conditions (57)–(60) becomes a local minimizer. Notice that the results (53)–(60) are coupled forward-in-time and backwardin-time matrix-valued differential equations. Putting the corresponding state and costate equations together, the following optimality system for cooperative decision strategies with risk aversion are summarized as follows. Theorem 3 Let .A; Bi / and .A; Ci / for i D 1; 2 be uniformly stabilizable and detectable. Suppose that ui ./ D Ki ./xO i ./ 2 Ui ; the common state and local measurement processes are defined by (3)–(5); and the decentralized filters with Li ./ are governed by (7). Then cooperative decision and control strategies u1 ./ and u2 ./ with risk aversion supported by the optimal pairs .K1 ./; L1 .// and .K2 ./; L2 .// are given by " K1 .t/

D

R11 .t/B1T .t/

I0T

k X

r Hr .t/ P .T t/.I0 I1 / C I2T

rD1

#

P .T t/.I2 I1 / "

( L1 .t/

D

I1T

k X rD1

I1T

k X rD1

r Hr .t/

rD1

.I0 I1 /T P .T t/.I0 I1 /

1

(73)

# ) 1 2rŠ H .t/P .T t/Hrs .t/ I1

r sŠ.r s/Š s rD2 sD1

k X

r Hr .t/C

k X

r1 X

r Hr .t/ P .T t/I1 C1T .t/V11

(74)

326

K.D. Pham and M. Pachter

and K2 .t/

" D

R21 .t/B2T .t/

I0T

k X

r Hr .t/ P .T t/.I0 I2 / C I1T

rD1

#

P .T t/.I1 I2 / ( L2 .t/

D

I2T

k hX

r Hr .t/C

rD1

I2T

k X

k X

r Hr .t/

rD1

1 .I0 I2 /T P .T t/.I0 I2 /

k X rD2

r

r1 X sD1

i 2rŠ Hs .t/P .T t/Hrs .t/ I2 sŠ.r s/Š

r Hr .t/ P .T t/I2 C2T .t/V21

(75) ) 1

(76)

rD1

where the optimal state solutions fHr ./gkrD1 supporting all the statistics for performance robustness and risk-averse decisions are governed by the forwardin-time matrix-valued differential equations with the terminal-value conditions H1 .0/ D NO T and Hr .0/ D 0 for 2 r k d H .t/ D .FO /T .t/H1 .t/ C H1 .t/FO .t/ C NO .t/ dt 1 d H .t/ D .FO /T .t/Hr .t/ C Hr .t/FO .t/ dt r C

r1 X

2rŠ Hs .t/GO .t/WO .GO /T .t/Hrs .t/ sŠ.r s/Š sD1

(77)

(78)

and the optimal costate solution P ./ satisfies the backward-in-time matrix-valued differential equation with the terminal-value condition P .T / D z0 zT0 d P .t/ D FO .t/P .t/ P .t/.FO /T .t/ GO .t/WO .GO /T .t/ : dt

(79)

Remark 1. The results herein are certainly viewed as the generalization of those obtained from [9], where with respect to the subject of performance robustness, most developed work has fundamentally focused on the first-order assessment of performance variations through statistical averaging of performance measures of interest. To obtain the optimal values for cooperative control strategies, a twopoint boundary value problem involving matrix differential equations must be solved. Moreover, the states fHr ./ gkrD1 and costates P ./ play an important role in the determination of cooperative decision strategies with risk aversion. Not only Ki ./ and Li ./ for i D 1; 2 are tightly coupled. They also depend on the mathematical statistics associated with performance uncertainty; in particular,

Information Considerations in Multi-Person Cooperative Control...

327

mean, variance, skewness, etc. The need for the decision laws of cooperative strategies to take into account accurate estimations of performance uncertainty is one form of interaction between two interdependent functions of a decision strategy: (1) anticipation of performance uncertainty and (2) proactive decisions for mitigating performance riskiness. This form of interaction between these two decision strategy functions gives rise to what are now termed as performance probing and performance cautioning and thus are explicitly concerned in optimal statistical control of stochastic large-scale multi-agent systems [5, 6].

6 Conclusions A new cooperative solution concept proposed herein is aimed at analytically addressing performance robustness, which is widely recognized as the pressing need in management control of stochastic multi-agent systems. One might consider typical applications in integrated situational awareness and socioeconomic problems in which the manager of an information-gathering department assigns his datacollecting group of people to perform such tasks as collect data, conduct polls, or research statistics so that an accurate forecast regarding future trends of the entire organization or agency can be carried out. In the most basic framework of performance-information analysis, a performance-information system transmits messages about higher-order characteristics of performance uncertainty to cooperative agents for use in future adaption of risk-averse decisions. The messages of performance-measure statistics transmitted are then influenced by the attributes of the interactive decision setting. Performance-measure statistics are now expected to work not only as feedback information for future risk-averse decisions but also as an influence mechanism for cooperative agents’ behaviors. The solution of a matrix two-point boundary value problem will yield the optimal parameter values of cooperative decision strategies. Furthermore, the implementation of the analytical solution can be computationally intensive. Henceforth, the basic concept of successive approximation and thus a sequence of suboptimal control functions will be the emerging subject of future research investigation.

References 1. 2. 3. 4.

Pollatsek, A., Tversky, A.: Theory of risk. J. Math. Psychol. 7, 540–53 (1970) Luce, R.D.: Several possible measures of risk. Theory Decis. 12, 217–228 (1980) Radner, R.: Team decision problems. Ann. Math. Stat. 33, 857–881 (1962) Sandell, N.R. Jr., Varaiya, P., Athans, M., Safonov, M.G.: A survey of decentralized control methods for large-scale systems. IEEE Trans. Automat. Contr. 23, 108–129 (1978) 5. Pham, K.D.: New results in stochastic cooperative games: strategic coordination for multiresolution performance robustness. In: Hirsch, M.J., Pardalos, P.M., Murphey, R., Grundel, D. (eds.) Optimization and Cooperative Control Strategies. Series Lecture Notes in Control and Information Sciences, vol. 381, pp. 257–285 (2008)

328

K.D. Pham and M. Pachter

6. Pham, K.D.: Performance-information analysis and distributed feedback stabilization in large-scale interconnected systems. In: Hirsch, M.J., Pardalos, P.M., Murphey, R. (eds.) Dynamics of Information Systems Theory and Applications Series: Springer Optimization and Its Applications, vol. 40, pp. 45–81. Springer, New York (2010). DOI:10.1007/978-1-4419-5689-7 3 7. Athans, M.: The matrix minimum prinicple. Inform. Contr. 11, 592–606. Elsevier (1967) 8. Brockett, R.W.: Finite Dimensional Linear Systems. Wiley, New York (1970) 9. Chong, C.Y.: On the stochastic control of linear systems with different information sets. IEEE Trans. Automat. Contr. 16(5), 423–430 (1971)

Modeling Interactions in Complex Systems: Self-Coordination, Game-Theoretic Design Protocols, and Performance Reliability-Aided Decision Making Khanh D. Pham and Meir Pachter

Abstract The subject of this research article is concerned with the development of approaches to modeling interactions in complex systems. A complex system contains a number of decision makers, who put themselves in the place of the other: to build a mutual model of other decision makers. Different decision makers have different influence in the sense that they will have control over—or at least be able to influence—different parts of the environment. Attention is first given to process models of operations among decision makers, for which the slow and fastcore design is based on a singularly perturbed model of complex systems. Next, self-coordination and Nash game-theoretic formulation are fundamental design protocols, lending themselves conveniently to modeling self-interest interactions, from which complete coalition among decision makers is not possible due to hierarchical macrostructure, information, or process barriers. Therefore, decision makers make decisions by assuming the others try to adversely affect their objectives and terms. Individuals will be expected to work in a decentralized manner. Finally, the standards and beliefs of the decision makers are threefold: (i) a high priority for performance-based reliability is made from the start through a means of performance-information analysis; (ii) a performance index has benefit and risk

The views expressed in this article are those of the authors and do not reflect the official policy or position of the United States (U.S.) Air Force, Department of Defense, or U.S. Government. K.D. Pham Air Force Research Laboratory, Space Vehicles Directorate, Kirtland Air Force Base, New Mexico 87117, USA e-mail: [email protected]

M. Pachter () Air Force Institute of Technology, Department of Electrical and Computer Engineering, Wright-Patterson Air Force Base, Ohio 45433, USA e-mail: [email protected] 329 A. Sorokin et al. (eds.), Dynamics of Information Systems: Mathematical Foundations, Springer Proceedings in Mathematics & Statistics 20, DOI 10.1007/978-1-4614-3906-6 17, © Springer Science+Business Media New York 2012

330

K.D. Pham and M. Pachter

awareness to ensure how much of the inherent or design-in reliability actually ends up in the developmental and operational phases; and (iii) risk-averse decision policies towards potential interference and noncooperation from the others. Keywords Fast and slow interactions • Mutual modeling • Self-coordination • Performance-measure statistics • Risk-averse control decisions • Performance reliability • Minimax estimation • Stochastic Nash games • Dynamic programming

1 Introduction Today, a new view of business operations, including sales, marketing, manufacturing, and design as inherently complex, computational, and adaptive systems, has been emerging. Complex systems are composed of intelligent adaptive decision makers constrained and enabled by their locations in networks linking decision makers and knowledge and by the tasks, in which they are engaged. Some of the techniques for dealing with the size and complexity of these complex systems are modularity, distribution, abstraction, and intelligence. Combining these techniques implies the use of intelligent, distributed modules—the concept of multi-model strategies for large-scale stochastic systems introduced in [1]. Therein, it was shown that in order to obtain near equilibrium Nash strategies, the decision makers need only to solve two decoupled low-order systems: a stochastic control problem in the fast time scale at local levels and a joint slow game problem with finitedimensional state estimators. This is accomplished by leveraging the multi-model situation wherein each decision maker needs to model only his local dynamics and some aggregated dynamics of the rest of the system. The intention of this research article is to extend the results [1] for two-person nonzero-sum Linear Quadratic Gaussian (LQG) Nash games, to robust decision making for multiperson quadratic decision problems toward performance values and risks. When measuring performance reliability, statistical analysis for probabilistic nature of performance uncertainty is relied on as part of the long-range assessment of reliability. One of the most widely used measures for performance reliability is the statistical mean or average to summarize the underlying performance variations. However, other aspects of performance distributions that do not appear in most of the existing progress are variance, skewness, and so forth. For instance, it may nevertheless be true that some performance with negative skewness appears riskier than performance with positive skewness when expectation and variance are held constant. If skewness does, indeed, play an essential role in determining the perception of risk, then the range of applicability of the present theory for stochastic control and operations research should be restricted, for example, to symmetric or equally skewed performance-measures. Thus, for reliability reasons on performance distributions, the research investigation herein is unique when compared to the existing literature and results.

Modeling Interactions in Complex Systems

331

Specifically, technical merits and research contributions include an effective integration of performance-information analysis into risk-averse strategy selection for performance robustness and reliability requirements so that: (i) intrinsic performance variations caused by stationary environments are addressed concurrently with other performance requirements and (ii) trade-off analysis on performance benefits and risks directly evaluates the impact of reliability as well as other performance requirements. Hence, via higher-order performance-measure statistics and adaptive decision making, it is anticipated that future performance variations will lose the element of surprise due to the inherent property of selfenforcing and risk-averse decision solutions that are highly capable of reshaping probabilistic performance distributions at both macro- and microlevels. The outline of this research begins with Sects. 2 and 3 that deal with subject of how to formulate complex systems with multiple time scales and autonomous decision makers. Section 4 considers self-coordination, by which the procedure for controlling fast timescale behavior with stabilizing feedback and risk-averse decision policies addresses multi-level performance robustness. Section 5 also presents a robust procedure for analyzing noncooperative modes of slow timescale interactions and for designing Nash equilibrium actions. Finally, a summary and remarks are given in Sect. 6.

2 Setting the Scene Before going into a formal presentation, it is necessary to consider some conceptual notations. To be specific, for a given Hilbert space X with norm jj jjX , 1 p 1, and a; b 2 R such that a b, a Banach space is defined as p follows LF .a; bI X / , f./ D f.t; !/ W a t bg such that ./ is an X -valued Rb p Ft -measurable process on Œa; b with Ef a jj.t; !/ jjX dtg < 1g with the norm Rb p jj./jjF ;p , .Ef a jj.t; !/jjX dtg/1=p , where the elements ! of the filtered sigma field Ft of a sample description space ˝ that is adapted for the time horizon Œa; b are random outcomes or events. Also, the Banach space of X -valued continuous functionals on Œa; b with the max-norm induced by jj jjX is denoted by C.a; bI X /. The deterministic version and its associated norm are written as Lp .a; bI X / and jj jjp . To understand the evolutions of complex systems, system dynamic approaches and models are excellent tools for simulating and exploring evolving processes. Herein, a strongly coupled slow-core process with the initial-value state x0 .t0 / D x00 0 dx0 .t/ D @A0 x0 .t/ C

N X j D1

A0j xj .t/ C

N X j D1

1 B0j uj .t/A dt C G0 dw.t/ ;

(1)

332

K.D. Pham and M. Pachter

where the constant coefficients A0 2 Rn0 n0 , A0j 2 Rn0 nj , B0j 2 Rn0 mj , G0 2 Rn0 p0 , while N weakly coupled fast-core processes with the constant coefficients Ai 0 2 Rni n0 , Ai i 2 Rni ni , Aij 2 Rni nj , Bi i 2 Rmi mi , and Gi 2 Rni p0 0 "i dxi .t/ D @Ai 0 x0 .t/ C Ai i xi .t/ C

N X

1 "ij Aij xj .t/ C Bi i ui .t/A dt C

p

"i Gi dw.t/

j D1;j ¤i

xi .t0 / D xi 0 ;

i D 1; : : : ; N

(2)

are proposed to account for the pairing of mutual influence with temporal features, by which N decision makers are now capable of dynamically coordinating their activities and cooperating with others. Each decision maker i is assumed to be acting autonomously and so making decisions about what to do at engagement time through information sampling and exchanges available locally dy0i .t/ D .C0i x0 .t/ C Ci xi .t// dt C dv0i .t/; i D 1; : : : ; N p p dyi i .t/ D "i Ci 0 x0 .t/ C Ci i xi .t/ dt C "i dvi i .t/ :

(3) (4)

Furthermore, all decision makers operate within local environments modeled by the filtered probability spaces that are defined with p0 , q0i , and qi i -dimensional stationary Wiener processes adapted for Œt0 ; tf together with the correlations of independent increments for all ; 2 Œt0 ; tf ˚ E Œw./ w./Œw./ w./T D W j j; W > 0 ˚ E Œv0i ./ v0i ./Œv0i ./ v0i ./T D V0i j j; V0i > 0 ˚ E Œvi i ./ vi i ./Œvi i ./ vi i ./T D Vi i j j; Vi i > 0: The small singular perturbation parameters "i > 0 for i D 1; : : : ; N represent different time constants, masses, etc., which help to account for decision makers’ responsiveness to internal and external changes from their environments as well as their inertia and stability over time. Other small regular perturbation parameters "ij are weak coupling between the decision makers. Note that each decision maker now has his/her own observations (3) and (4), makes his/her own admissible decisions ui 2 Ui L2F .t0 ; tf I Rmi /, and has his/her own unique history of interactions (2) with fast states xi 2 L2F .t0 ; tf I Rni /. The coefficient matrices Ai i are also assumed to be invertible. For a practical purpose, p the "i factor is further inserted to both process and observation noise terms to ensure the fast variables xi physically meaningful for control and estimation purposes. A more complete discussion about the use and justification of this practice can be found in [2, 3].

Modeling Interactions in Complex Systems

333

3 Multi-Model Generation So far, there has been nothing of how decision makers can work together. In this section, decision makers in the complex system are active in interpreting events and subsequently motivating appropriate responses to these events. In this sense, decision maker i decides to continue or discontinue relations with others. For example, decision maker i may choose to neglect the fast dynamics of decision makers j and the weak interconnections between the fast timescale processes; for example, by setting "j D 0 on the left hand side of (2) and "ij D 0 in (2). For any j D 1; : : : ; N and j ¤ i , the long-term behavior or steady-state dynamics of neighboring decision makers j is then given by x j .t/dt D A1 jj

p Aj 0 x0 .t/ C Bjj uj .t/ dt C "j Gj dw.t/ :

(5)

As mentioned in [3], the result (5) turns out to be as valid inputs to the slow timescale process (1). Viewed from the mutual influence of one decision maker to those of others, self-coordination preferred by decision maker i is hence described by a simplified model whose dynamical states x0i 2 L2F .t0 ; tf I Rn0 / and xii 2 L2F .t0 ; tf I Rni /, resulted from the substitution of the stochastic process (5) into those of (1) and (2) 0 dx0i .t/ D @Ai0 x0i .t/ C A0i xii .t/C

N X

1 i B0j uj .t/ C B0i ui .t/A dt C G0i dw.t/

j D1;j ¤i

(6)

p "i dxii .t/ D Ai 0 x0i .t/ C Ai i xii .t/ C Bi i ui .t/ dt C "i Gi dw.t/ ;

(7)

where the initial-value states x0i .t0 / x00 and xii .t0 / xi 0 , while the coefficients P 1 i 1 i are given by Ai0 , A0 N j D1;j ¤i A0j Ajj Aj 0 , B0j , B0j A0j Ajj Bjj , and G0 , PN p 1 G0 j D1;j ¤i "j A0j Ajj Gj . With the simplified model (6) and (7) in mind, decision maker i can bring his/her activities into coordination with the activities of others via his/her aggregate observations yii 2 L2F .t0 ; tf I Rqi 0 Cqi i / "

dyii .t/

#

x0i .t/ dt C dvi .t/ xii .t/ D Ci s x0i .t/ C Di s ui .t/ dt C dvi s .t/;

D

C0i Ci 0

Ci p1 Ci i "i

i D 1; : : : ; N

(8)

# p dy0i dv0i dv0i "i Ci A1 i i Gi dw , , dvi , , dvi s , , p1 dyi i dvi i Ci i A1 dvi i "i i i Gi dw " " # # 1 1 C0i Ci Ai i Ai 0 Ci Ai i Bi i Ci s , , and Di s , . 1 p Ci 0 p1"i Ci i A1 A C A1 Bi i i0 ii "i i i i i "

provided that dyii

334

K.D. Pham and M. Pachter

Fig. 1 A two-level structure for online dynamic coordination

Under such the simplified model (6) and (7) being used by those decision makers, the entire group of N decision makers may work as a team with each one fitting in, where he/she thinks his/her effort will be most effective and will interfere least with the others. Occasionally decision makers interact at the slow timescale level; but most of the adjustments take place silently and without deliberation at the fast timescale levels. All these situations, where self-coordination is possible, require that each decision maker be able to possess the knowledge of the parameters associated with the simplified model (6) and (7). With references to the work [1], a two-level structure, as shown in Fig. 1 for online dynamic coordination, is adapted with appropriate paradigms for estimate observations and decision making with risk aversion. In particular, the individual assessment of the alternatives available is obtained by solving 2N low-order problems: N independent optimal statistical control problems for each decision maker at the fast timescale level; and N constrained stochastic Nash games at the slow timescale level.

Modeling Interactions in Complex Systems

335

4 Fast Interactions Short horizon interactions are now concerned with establishing a framework for information analysis and performance-risk bearing decisions that permit consequences anticipated on performance reliability for the decision makers in charge of local fast operations within stochastic environments p "i dxif .t/ D Ai i xif .t/ C Bi i uif dt C "i Gi dw.t/; dyi if D Ci i xif .t/dt C dvi i .t/;

i D 1; : : : ; N

xif .t0 / D xi 0 f fast.

(9) (10)

Yet, the decision makers attempt to make risk-bearing decisions uif from the admissible sets Uif L2F .t0 ; tf I Rmi / for reliable attainments of integral-quadratic utilities; for instance, Jif W Rni Uif 7! RC with the rules of action f

Jif .xi 0 ; uif / D "i xifT .tf /Qif xif .tf / Z tf h i C xifT ./Qif xif ./ C uTif ./Rif uif ./ d :

(11)

t0

f

The design-weighting matrices Qif 2 Rni ni , Qif 2 Rni ni , and Rif 2 Rmi mi are real, symmetric, and positive semidefinite with Rif invertible. The relative “size” of Qif and Rif enforces trade-offs between the speed of response and the size of the control decision. At this point, it is convenient to use the Kalman-like estimates xO if 2 L2F .t0 ; tf I Rni / with the initial state estimates xO if .t0 / D xi 0 , Kalman gain Lif .t/ , Pif .t/CiTi Vi1 i , and the estimate-error covariances Pif 2 C 1 .t0 ; tf I Rni ni / with the initial-value conditions Pif .t0 / D 0 for i D 1; : : : ; N "i dxO if .t / D Ai i xO if .t / C Bi i uif .t / dt C Pif .t /CiTi Vi1 O if .t /dt / i .dyi if .t / Ci i x (12) "i

d T Pif .t / D Pif .t /ATii C Ai i Pif .t / Pif .t /CiTi Vi1 i Ci i Pif .t / C Gi W Gi dt

(13)

to approximately describe the future evolution of the fast timescale process (9) when different control decision processes applied. From (13), the covariance of error estimates is independent of decision action and observations. Therefore, to parameterize the conditional densities p.xif .t/jFt / and i D 1; : : : ; N , the conditional mean xO if .t/ minimizing error-estimate covariance of xif .t/ is only needed. Thus, a family of decision policies is chosen of the form: if W if 7! Uif , uif D if .if /, and if , t; xO if .t/ . Since the quadratic decision problem (9) and (11) is of interest, the search for closed-loop feedback decision laws is then restricted within the strategy space, which permits a linear feedback synthesis uif .t/ , Kif .t/xO if .t/ ;

for i D 1; : : : ; N

(14)

336

K.D. Pham and M. Pachter

wherein the elements of Kif .t/ 2 C.t0 ; tf I Rmi ni / represent admissible fast timescale decision gains defined in some appropriate sense. Moreover, the pairs .Ai i ; Bi i / and .Ai i ; Ci i / for i D 1; : : : ; N are assumed to be stabilizable and detectable, respectively. Under this assumption, such feedback and filter gains Kif ./ and Lif ./ exist so that the aggregate system dynamics is exponentially stable. The following result provides a representation of riskiness from the standpoint of higher-order characteristics pertaining to probabilistic performance distributions with respect to the underlying stochastic environment. This representation also has significance at the level of decision making, where risk-averse courses of action originate. Theorem 1 (Fast Interactions—Performance-measure Statistics). For fast interactions governed by (9) and (11), the pairs .Ai i ; Bi i / and .Ai i ; Ci i / are stabilizable and detectable. Then, for any given kif 2 N, the kif th cumulant associated with the performance-measure (11) for decision maker i is given as follows: k

ifif D xiT0 Hif11 .t0 ; kif /xi 0 C Dif .t0 ; kif /;

i D 1; : : : ; N;

k

k

(15) k

if if if , fHif12 .˛; r/grD1 , fHif21 .˛; r/grD1 , where all the cumulant variables fHif11 .˛; r/grD1

k

k

if if and fDif .˛; r/grD1 evaluated at ˛ D t0 satisfy the matrix and fHif22 .˛; r/grD1 scalar-valued differential equations (with the dependence of Hif11 .˛; r/, Hif12 .˛; r/, Hif21 .˛; r/, Hif22 .˛; r/, and Dif .˛; r/ upon the admissible Kif suppressed)

d 11 11 H .˛; r/ D Fif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif21 .˛/; Kif .˛// d˛ if d 12 12 H .˛; r/ D Fif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif22 .˛/; Kif .˛// d˛ if d 21 21 H .˛; r/ D Fif;r .˛; Hif11 .˛/; Hif21 .˛/; Hif22 .˛/; Kif .˛// d˛ if d 22 22 H .˛; r/ D Fif;r .˛; Hif12 .˛/; Hif21 .˛/; Hif22 .˛// d˛ if d Dif .˛; r/ D Gif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif21 .˛/; Hif22 .˛// ; d˛

(16) (17) (18) (19) (20)

f

where the terminal-value conditions Hif11 .tf ; 1/ D "i Qif , Hif11 .tf ; r/ D 0 for 2 r

f

kif ; Hif12 .tf ; 1/ D "i Qif , Hif12 .tf ; r/ D 0 for 2 f

r kif ; Hif21 .tf ; 1/ D "i Qif , Hif21 .tf ; r/ D 0 for 2 r kif ; f

Hif22 .tf ; 1/ D "i Qif , Hif22 .tf ; r/ D 0 for 2 r kif ; and Dif .tf ; r/ D 0 for 1 r

kif . Furthermore, all the kif -tuple variables Hif11 .˛/ ,

.Hif11 .˛; 1/; : : : ; Hif11 .˛; kif .Hif21 .˛; 1/; : : : ; Hif21 .˛; kif

//; Hif12 .˛/ , .Hif12 .˛; 1/; : : : ; Hif12 .˛; kif //; Hif21 .˛/ , //; and Hif22 .˛/ , .Hif22 .˛; 1/; : : : ; Hif22 .˛; kif //.

Modeling Interactions in Complex Systems

337

Proof. With the interest of space limitation, the proof is omitted. Interested readers are referred to the Appendix and [4] for the mathematical definitions of the mappings governing the right members of (16)–(20) and in-depth development, respectively. To anticipate for a well-posed optimization problem that follows, some sufficient conditions for the existence of solutions to the cumulant-generating equations (16)–(20) in the calculation of performance-measure statistics are now presented in the sequel. Theorem 2 (Fast Interactions—Existence of Performance-Measure Statistics). Let .Ai i ; Bi i / and .Ai i ; Ci i / be stabilizable and detectable. Then, any given any given kif 2 N, the time-backward matrix and scalar-valued differential equations k

k

if if (16)–(20) admit unique and bounded solutions fHif11 .˛; r/grD1 , fHif12 .˛; r/grD1 ,

k

k

k

if if if , fHif22 .˛; r/grD1 , and fDif .˛; r/grD1 on Œt0 ; tf . fHif21 .˛; r/grD1

Proof. With references to stabilizable and detectable assumptions, there always exist some feedback decision gains Kif 2 C.t0 ; tf I Rmi ni / and filter gains Lif 2 C .t0 ; tf I Rni qi i / so that composite state matrices FAi i CBi i Kif 2 C.t0 ; tf I Rni ni / and FAi i Lif Ci i 2 C.t0 ; tf I Rni ni / are exponentially stable on Œt0 ; tf . Therefore, if

if

the state transition matrices ˚Ai i CBi i Kif .t; t0 / and ˚Ai i Lif Ci i .t; t0 / associated with if

FAi i CBi i Kif .t/ and FAi i Lif Ci i .t/ have the properties: limtf !1 jj˚Ai i CBi i Kif .tf ; /jj D Rt if 0 and limtf !1 t0f jj˚Ai i CBi i Kif .tf ; /jj2 d < 1. By the matrix variation of constant formula, the unique and time-continuous solutions to the (16)–(20) can if if be expressed in terms of ˚Ai i CBi i Kif .t; t0 / and ˚Ai i Lif Ci i .t; t0 /. As long as the growth rate of the integrals is not faster than the exponentially decreasing rate of if if two factors of ˚Ai i CBi i Kif .t; t0 / and ˚Ai i Lif Ci i .t; t0 /, it is then concluded that there k

if , exist upper bounds on the unique and time-continuous solutions fHif11 .˛; r/grD1

k

k

k

k

if if if if , fHif21 .˛; r/grD1 , fHif22 .˛; r/grD1 , and fDif .˛; r/grD1 for any time fHif12 .˛; r/grD1 interval Œt0 ; tf .

Remark 1. Notice that the solutions Hif11 .˛/, Hif12 .˛/, Hif21 .˛/, Hif22 .˛/, and Dif .˛/ of the (16)–(20) depend on the admissible decision gain Kif of the feedback decision law (14) by decision makers i for i D 1; : : : ; N . In the sequel and elsewhere, when this dependence is needed to be clear, then the notations Hif11 .˛; Kif /, Hif12 .˛; Kif /, Hif21 .˛; Kif /, Hif22 .˛; Kif /, and Dif .˛; Kif / should be used to denote the solution trajectories of the dynamics (16)–(20) with the given feedback decision gain Kif . Next, the components of 4kif -tuple Hif and kif -tuple Dif variables are defined by k k C1 2k 2k C1 3k 3k C1 4k Hif , H1if ; : : : ; Hifif ; Hifif : : : ; Hif if ; Hif if ; : : : ; Hif if ; Hif if ; : : : ; Hif if D .Hif11 .; 1/; : : : ; Hif11 .; kif /; Hif12 .; 1/; : : : ; Hif12 .; kif /; Hif21 .; 1/; : : : ; Hif22 .; kif //

338

K.D. Pham and M. Pachter

and k

1 ; : : : ; Difif / Dif , .Dif

D .Dif .; 1/; : : : ; Dif .; kif //: Henceforth, the product systems of dynamical equations (16)–(20), whose respec11 11 12 12 Fif;k , Fif12 , Fif;1 Fif;k , Fif21 , tive mappings Fif11 , Fif;1 if if

21 21 22 22 Fif;1 Fif;k , Fif22 , Fif;1 Fif;k , and Gif , Gif;1 Gif;kif are if if

defined on Œt0 ; tf .Rni ni /4kif Rmi ni and Œt0 ; tf .Rni ni /4kif in the optimal statistical control with dynamical output feedback, become d f Hif .˛/ D Fif .˛; Hif .˛/; Kif .˛// ; Hif .tf / D Hif ; d˛ d f Dif .˛/ D Gif .˛; Hif .˛// ; Dif .tf / D Dif ; d˛

(21) (22)

under the definition Fif , Fif11 Fif12 Fif21 Fif22 together with the aggregate terminal-value conditions f

f

f

f

Hif , "i Qif 0 …0 "i Qif 0 … 0 "i Qif 0 …0 „ ƒ‚ „ ƒ‚ „ ƒ‚ .kif 1/-times .kif 1/-times .kif 1/-times f

… 0: Dif , 0„ ƒ‚ kif -times

Given the evidences on surprises of utilities and preferences that now support the knowledge and beliefs of performance riskiness, all decision makers hence form rational expectations about the future and make decisions on the basis of this knowledge and these beliefs. Definition 1 (Fast Interactions—Risk-Value Aware Performance Index). As defined herein, the optimal statistical control consists in determining risk-averse decision uif to minimize the new performance index if0 , which is defined on a subset of ft0 g .Rni ni /kif .Rkif / such that if0 ,

k

k

C 2if if2 C C ifif ifif ; 1if if1 „ƒ‚… „ ƒ‚ … Standard Measure Risk Measures

(23)

r r where the rth order performance-measure statistics ifr ifr .t0 ; Hif .t0 /; Dif T r r if r .t0 // D xi 0 Hif .t0 /xi 0 C Dif .t0 / for 1 r kif and the sequence D fif

k

if with 1if > 0. Parametric design measures rif considered here represent 0grD1 different emphases on higher-order statistics and prioritizations by decision maker i toward robust performance and risk sensitivity.

Modeling Interactions in Complex Systems

339

Remark 2. This multi-objective performance index is interpreted as a linear combination of the first kif performance-measure statistics of the integral-quadratic utility (11), on the one hand, and a value and risk model, on the other, to reflect the trade-offs between performance benefits and risks. From the above definition, it is clear that the statistical problem is an initial-cost problem, in contrast with the more traditional terminal-cost class of investigations. One may address an initial cost problem by introducing changes of variables, which convert it to a terminal-cost problem. This modifies the natural context of the optimal statistical control, however, which it is preferable to retain. Instead, one may take a more direct dynamic programming approach to the initial-cost problem. Such an approach is illustrative of the more general concept of the principle of optimality, an idea tracing its roots back to the seventeenth century. The development in the sequel is motivated by the excellent treatment in [5] and is intended to follow it closely. Because [5] embodies the traditional endpoint problem and corresponding use of dynamic programming, it is necessary to make appropriate modifications in the sequence of results, as well as to introduce the terminology of the optimal statistical control. f f Let the terminal time tf and states .Hif ; Dif / be given. Then, the other end 0 0 ; Dif / are specified by a condition involved the initial time t0 and state pair .Hif target set requirement. 0 0 O if , where the ; Dif /2 M Definition 2 (Fast Interactions—Target Sets). .t0 ; Hif O if and i D 1; : : : ; N , is a closed subset defined by Œt0 ; tf target set M .Rni ni /4kif Rkif . f f if For the given terminal data .tf ; Hif ; Dif /, the class KO

f

f

tf ;Hif ;Dif Iif

of admissible

feedback gain is defined as follows. Definition 3 (Fast Interactions—Admissible Fedback Gains). Let the compact subset Kif Rmi ni be the set of allowable gain values. For the given kif 2 N and kif if with 1if > 0, let KO be the class of the sequence if D frif 0grD1 f f if tf ;Hif ;Dif I

C.Œt0 ; tf I Rmi ni / with values Kif ./ 2 Kif , for which the performance index (23) is finite and for which the trajectory solutions to the dynamic equations (21) and 0 0 O if . (22) reach .t0 ; Hif ; Dif /2M Now, the optimization problem is to minimize the risk-value aware performance if index (23) over all admissible feedback gains Kif D Kif ./ in KO . f f if tf ;Hif ;Dif I

Definition 4 (Fast Interactions—Optimization of Mayer Problem). Suppose kif that kif 2 N and the sequence if D frif 0grD1 with 1if > 0 are fixed. Then, the control optimization with output-feedback information pattern is given by if0 t0 ; Hif .t0 ; Kif /; Dif .t0 ; Kif / ; min O if Kif ./2K

f f tf ;Hif ;Dif Iif

subject to the dynamical equations (21) and (22) on Œt0 ; tf .

340

K.D. Pham and M. Pachter

It is important to recognize that the optimization considered here is in Mayer form and can be solved by applying an adaptation of the Mayer form verification theorem of dynamic programming as given in [5]. To embed the aforementioned optimization f f into a larger optimal control problem, the terminal time and states .tf ; Hif ; Dif / are parameterized as ."; Yif ; Zif /. Thus, the value function for this optimization problem is now depending on the terminal condition parameterizations. Definition 5 (Fast Interactions—Value Function). Suppose that ."; Yif ; Zif / 2 Œt0 ; tf .Rni ni /4kif Rkif is given and fixed. Then, the value function Vif ."; Yif ; Zif / is defined by Vif ."; Yif ; Zif / ,

inf if Kif ./ 2 KO ";Y

if

;Zif Iif

if0 t0 ; Hif .t0 ; Kif /; Dif .t0 ; Kif / : if

For convention, Vif ."; Yif ; Zif / , 1 when KO ";Y ;Z Iif is empty. To avoid cumif if bersome notation, the dependence of trajectory solutions on Kif ./ is suppressed. Next, some candidates for the value function are constructed with the help of the concept of reachable set. Definition 6 (Fast Interactions—Reachable Set). Let the reachable set QO if and i D 1; : : : ; N be n o if QO if , ."; Yif ; Zif / 2 Œt0 ; tf .Rni ni /4kif Rkif W KO ";Y ;Z Iif ¤ ; : if

if

Notice that QO if contains a set of points ."; Yif ; Zif /, from which it is possible to O if with some trajectory pairs corresponding to a continuous reach the target set M decision gain. Furthermore, the value function must satisfy both a partial differential inequality and an equation at each interior point of the reachable set, at which it is differentiable. Theorem 3 (Fast Interactions—Hamilton–Jacobi–Bellman (HJB) Equation). Let ."; Yif ; Zif / be any interior point of the reachable set QO if , at which the scalarvalued function Vif ."; Yif ; Zif / is differentiable. Then Vif ."; Yif ; Zif / satisfies the partial differential inequality 0

@ @ Vif ."; Yif ; Zif / C Vif ."; Yif ; Zif /vec.Fif ."; Yif ; Kif // @" @vec.Yif / C

@ Vif ."; Yif ; Zif /vec.Gif ."; Yif // @vec.Zif /

for all Kif 2 Kif and vec./ the vectorizing operator of enclosed entities.

(24)

Modeling Interactions in Complex Systems

341

if If there is an optimal feedback decision gain Kif in KO ";Y ;Z Iif , then the partial if if differential equation of dynamic programming ( @ Vif ."; Yif ; Zif /vec.Fif ."; Yif ; Kif // 0 D min Kif 2Kif @vec.Yif / ) @ @ Vif ."; Yif ; Zif /vec.Gif ."; Yif // C Vif ."; Yif ; Zif / C @vec.Zif / @" (25)

is satisfied. The minimum in (25) is achieved by the optimal feedback decision gain Kif ."/ at ". Proof. Interested readers are referred to the mathematical details in [6]. The verification theorem in the optimal statistical control notation is stated as follows. Theorem 4 (Fast Interactions—Verification Theorem). Fix kif 2 N and let Wif ."; Yif ; Zif / be a continuously differentiable solution of the HJB equation (25), which satisfies the boundary Wif ."; Yif ; Zif / D if0 ."; Yif ; Zif / for some O if . Let .tf ; Hf ; Df / be a point of QO if , let Kif be a feedback ."; Yif ; Zif / 2 M if decision gain in KO

if

f

f

tf ;Hif ;Dif Iif

if

and let Hif , Dif be the corresponding solutions

of the (21) and (22). Then, Wif .˛; Hif .˛/; Dif .˛// is a non-increasing function if defined on Œt0 ; tf with of ˛. If Kif is a feedback decision gain in KO f f if tf ;Hif ;Dif I

and Dif of the preceding equations such that, for the corresponding solutions Hif ˛ 2 Œt0 ; tf ,

0D

@ Wif .˛; Hif .˛/; Dif .˛// @" @ Wif .˛; Hif .˛/; Dif .˛//vec.Fif .˛; Hif .˛/; Kif .˛/// C @vec.Yif / C

@ Wif .˛; Hif .˛/; Dif .˛//vec.Gif .˛; Hif .˛/// ; @vec.Zif /

then Kif is an optimal feedback decision gain in KO

if

f

f

tf ;Hif ;Dif Iif

(26)

and Wif ."; Yif ; Zif /

D Vif ."; Yif ; Zif /, where Vif ."; Yif ; Zif / is the value function. Proof. The detailed analysis can be found in the work by the first author [6]. Recall that the optimization problem being considered herein is in Mayer form, which can be solved by an adaptation of the Mayer form verification theorem. Thus, f f the terminal time and states .tf ; Hif ; Dif / are parameterized as ."; Yif ; Zif / for a

342

K.D. Pham and M. Pachter

family of optimization problems. For instance, the states (21) and (22) defined on the interval Œt0 ; " now have terminal values denoted by Hif ."/ Yif and Dif ."/ Zif , where " 2 Œt0 ; tf . Furthermore, with kif 2 N and ."; Yif ; Zif / in QO if , the following real-value candidate: Wif ."; Yif ; Zif / D xiT0

kif X

rif .Yifr C Eifr ."//xi 0 C

rD1

kif X

rif .Zifr C Tifr ."// (27)

rD1

for the value function is therefore differentiable. The time derivative of Wif ."; Yif ; Zif / can also be shown of the form kif

X d d r T r r Wif ."; Yif ; Zif / D xi 0 if Fif ."; Yif ; Kif / C Eif ."/ xi 0 d" d" rD1

C

kif X

rif

Gifr

rD1

d ."; Yif / C Tifr ."/ d"

where the time parameter functions Eifr 2 C 1 .Œt0 ; tf I Rni ni / and Tifr 2 C 1 .Œt0 ; tr I R/ are to be determined. At the boundary condition, it requires that W.t0 ; Yif .t0 /; Zif .t0 // D if0 .t0 ; Yif .t0 /; Zif .t0 // ; which leads to xiT0

kif X

rif .Yifr .t0 / C Eifr .t0 //xi 0 C

rD1

D xiT0

kif X

rif .Zifr .t0 / C Tifr .t0 //

rD1 kif X

rif Yifr .t0 /xi 0 C

rD1

kif X

rif Zifr .t0 /:

(28)

rD1

By matching the boundary condition (28), it yields the time parameter functions Eifr .t0 / D 0 and Tifr .t0 / D 0 for 1 r kif . Next, it is necessary to verify that this candidate value function satisfies (26) along the corresponding trajectories produced by the feedback gain Kif resulting from the minimization in (25). Or equivalently, one obtains ( kif kif X X T r r xi 0 0 D min if Fif ."; Yif ; Kif /xi 0 C rif Gifr ."; Yif / Kif 2Kif

rD1

rD1

kif

CxiT0

X rD1

) X d r r d r E ."/xi 0 C if Tif ."/ : d" if d" rD1 kif

rif

(29)

Modeling Interactions in Complex Systems

343

Therefore, the derivative of the expression in (29) with respect to the admissible feedback decision gain Kif yields the necessary conditions for an extremum of (25) on Œt0 ; tf , Kif ."; Yif / D

1 T Rif Bi i

kif X

O sif Yifs ;

i D 1; : : : ; N;

(30)

sD1

where O sif , rif =1if with 1if > 0. With the feedback decision gain (30) n okif evaluated on replaced in the expression of the bracket (29) and having Yifs sD1

the solution trajectories (21) and (22), the time-dependent functions Eifr ."/ and Tifr ."/ are therefore chosen such that the sufficient condition (26) in the verification theorem is satisfied in the presence of the arbitrary value of xi 0 ; for example d 1 1 1 E ."/ D .Ai i C Bi i Kif ."//T Hif ."/ C Hif ."/.Ai i C Bi i Kif ."// d" if C Qif C KifT ."/Rif Kif ."/ and for 2 r kif , d r r r E ."/ D .Ai i C Bi i Kif ."//T Hif ."/ C Hif ."/.Ai i C Bi i Kif ."// d" if r1 i h X 2rŠ k Cv f f v rv C ."/˘11 ."/ C Hifif ."/˘21 ."/ Hif ."/ Hif vŠ.r v/Š vD1 C

r1 X vD1

i 2k Crv h 2rŠ k Cv f f v ."/˘12 ."/ C Hifif ."/˘22 ."/ Hif if ."/ Hif vŠ.r v/Š

together with, for 1 r kif , n o n o d r k Cr f f r Tif ."/ D Tr Hif ."/˘11 ."/ C Tr Hifif ."/˘21 ."/ d" o n o n 2k Cr 3k Cr f f C Tr Hif if ."/˘12 ."/ C Tr Hif if ."/˘22 ."/ with the initial-value conditions Eifr .t0 / D 0 and Tifr .t0 / D 0 for 1 r kif . Therefore, the sufficient condition (26) of the verification theorem is satisfied so that the extremizing feedback decision gain (30) by decision maker i and i D 1; : : : ; N becomes optimal. Finally, the principal results of fast interactions are now summarized for linear, time-invariant stochastic systems with uncorrelated Wiener stationary distributions. For this case, the representation of performance-measure statistics has been exhibited and the risk-averse decision solutions specified.

344

K.D. Pham and M. Pachter

Theorem 5 (Fast Interactions—Fast-Timescale Risk-Averse Decisions). Consider fast interactions with the statistical control problem (9), (11), and (23) wherein .Ai i ; Bi i / and .Ai i ; Ci i / are stabilizable and detectable. Fix kif 2 N, and k

if if D frif 0grD1 with 1if > 0. Then, the risk-averse decision policy that minimizes the performance index (23) is exhibited in fast interactions by decision maker i for i D 1; : : : ; N

uif .t/ D Kif .t/xO if .t/; Kif

.˛/ D

1 T Rif Bi i

kif X

t , t0 C tf ˛; r O rif Hif .˛/;

˛ 2 Œt0 ; tf

O rif ,

rD1

rif

(31)

1if

where all the parametric design freedom through O rif represent different weights toward specific summary statistical performance-measures; that is, mean, variance, skewness, etc. chosen by decision maker i for his/her performance robustness. The kif r .˛/grD1 satisfy the coupled time-backward matrix-valued optimal solutions fHif f

1 differential equations with the terminal-value conditions Hif .tf / D "i Qif and r Hif .tf / D 0 when 2 r kif

d 1 1 H .˛/ D .Ai i C Bi i Kif .˛//T Hif .˛/ d˛ if 1 Hif .˛/.Ai i C Bi i Kif .˛// Qif .Kif /T .˛/Rif Kif .˛/

(32)

d r r H .˛/ D .Ai i C Bi i Kif .˛//T Hr if .˛/ Hif .˛/.Ai i C Bi i Kif .˛// d˛ if r1 i h X 2rŠ kif Cv f f Hv .˛/˘21 .˛/ Hrv .˛/ if .˛/˘11 .˛/ C Hif if vŠ.r v/Š vD1

i h 2rŠ kif Cv 2kif Crv f f Hv .˛/˘ .˛/ C H .˛/˘ .˛/ Hif .˛/ 12 22 if if vŠ.r v/Š vD1 r1 X

(33)

and the optimal auxiliary solutions

k Cr kif fHifif .˛/grD1

of the time-backward difk C1

ferential equations with the terminal-value conditions Hifif k Cr

Hifif

f

.tf / D "i Qif and

.tf / D 0 when 2 r kif

d kif C1 k C1 k C1 Hif .˛/ D .Ai i C Bi i Kif .˛//T Hifif .˛/ Hifif .˛/.Ai i Lif .˛/Ci i / d˛ H1 if .˛/.Lif .˛/Ci i / Qif

(34)

Modeling Interactions in Complex Systems

345

d kif Cr k Cr k Cr H .˛/ D .Ai i C Bi i Kif .˛//T Hifif .˛/ Hifif .˛/ d˛ if .Ai i Lif .˛/Ci i / r Hif .˛/Lif .˛/Ci i

r1 X

2rŠ vŠ.r v/Š vD1

i k Crv h k Cv f f v .˛/˘11 .˛/ C Hifif .˛/˘21 .˛/ Hifif .˛/ Hif

r1 X vD1

h 2rŠ f v Hif .˛/˘12 .˛/ vŠ.r v/Š k Cv

CHifif

2k Cr

and the optimal auxiliary solutions fHif if

i 3k Crv f .˛/˘22 .˛/ Hif if .˛/ k

if .˛/grD1 of the time-backward differ-

2k C1

ential equations with the terminal-value conditions Hif if 2k Cr

Hif if

(35)

f

.tf / D "i Qif and

.tf / D 0 when 2 r kif

d 2kif C1 2k C1 H .˛/ D .Ai i Lif .˛/Ci i /T Hif if .˛/ d˛ if 2k C1

Hif if

1 .˛/.Ai i C Bi i Kif .˛// .Lif .˛/Ci i /T Hif .˛/ Qif

(36) d 2kif Cr 2k Cr Hif .˛/ D .Ai i Lif .˛/Ci i /T Hif if .˛/ d˛ 2k Cr

Hif if

r1 X vD1

r .˛/.Ai i C Bi i Kif .˛// .Lif .˛/Ci i /T Hif .˛/

h 2rŠ 2k Cv f Hif if .˛/˘11 .˛/ vŠ.r v/Š 3k Cv

CHif if

r1 X vD1

i f rv .˛/˘21 .˛/ Hif .˛/

h 2rŠ 2k Cv f Hif if .˛/˘12 .˛/ vŠ.r v/Š 3k Cv

CHif if

i 2k Crv f .˛/˘22 .˛/ Hif if .˛/ (37)

346

K.D. Pham and M. Pachter 3k Cr

and finally the optimal auxiliary solutions fHif if

k

if .˛/grD1 of the time-backward

3k C1

differential equations with the terminal-value conditions Hif if 3k Cr

Hif if

f

.tf / D "i Qif and

.tf / D 0 when 2 r kif , d 3kif C1 3k C1 H .˛/ D .Ai i Lif .˛/Ci i /T Hif if .˛/ d˛ if 3k C1

Hif if

.˛/.Ai i Lif .˛/Ci i / k C1

Qif .Lif .˛/Ci i /T Hifif 2k C1

Hif if

.˛/

.˛/.Lif .˛/Ci i /

(38)

d 3kif Cr 3k Cr H .˛/ D .Ai i Lif .˛/Ci i /T Hif if .˛/ d˛ if 3k Cr

.˛/.Ai i Lif .˛/Ci i / .Lif .˛/Ci i /T Hifif

2k Cr

.˛/.Lif .˛/Ci i /

Hif if Hif if

r1 X vD1

k Cr

h 2rŠ 2k Cv f Hif if .˛/˘11 .˛/ vŠ.r v/Š 3k Cv

CHif if

r1 X vD1

.˛/

i k Crv f .˛/˘21 .˛/ Hifif .˛/

h 2rŠ 2k Cv f Hif if .˛/˘12 .˛/ vŠ.r v/Š 3k Cv

CHif if

i 3k Crv f .˛/˘22 .˛/ Hif if .˛/ (39)

where the Kalman gain Lif .t/ , Pif .t/CiTi Vi1 i is solved forwardly in time, "i

d T Pif .t/ D Pif .t/ATii C Ai i Pif .t/ Pif .t/CiTi Vi1 i Ci i Pif .t/ C Gi W Gi dt Pif .t0 / D 0 :

(40)

Remark 3. As it can be seen from (32)–(39), the calculation of the optimal feedback decision gain Kif ./ depends on the filter gain Lif ./ of the Kalman state estimator. Therefore, the design of optimal risk-averse decision control cannot be separated from the state estimation counterpart. In other words, the separation principle as often inherited in the LQG problem class is no longer applicable in this generalized class of stochastic control.

Modeling Interactions in Complex Systems

347

5 Slow Interactions As has been alluding to, self-coordination is possible when each decision maker knows his/her place in the scheme and is prepared to carry out his/her job with the others. A useful approach for understanding the self-coordination of complex systems is to focus on slow interactions. Herein slow interactions used to map and simulate engagements within and between communities of decision makers are therefore formulated by setting "i D 0 and "ij D 0 of the fast timescale processes (2). Thinking about mutual influence suggests the integration of steadystate dynamics of individual process (5) with the macro-level process (1) and flows of information (3) and (4). Specifically, a typical formulation for slow interactions (with s “slow”) is considered as follows: ! N X dx0s .t/ D A0s x0s .t/ C Bi s ui s .t/ dt C G0s dw.t/; x0s .t0 / D x00 (41) i D1 i where the constant coefficients A0s Ai0 , Bi s D B0i A0i A1 i i Bi i , and G0s G0 . As the slow timescale process is at work, decision maker i attempts to optimize his/her own performance. In fact, the long-term behavior or the steady-state dynamics (5) of decision maker i could yield some ill-defined terms like the integrals of the second-order statistics associated with the underlying Wiener stationary processes when substituting (5) into the utilities of decision makers, as have been well documented in [1]. However, these ill-defined terms are independent of the input decisions, ui s 2 Ui s L2F .t0 ; tf I Rmi /. For this reason, it is expected that the optimal decision law by decision maker i obtained by solving the modified utility but assuming the only drift effect of the long-term behavior (5), zi .t/ , A1 i i .Ai 0 x0s .t/ C Bi i ui s .t// and t 2 Œt0 ; tf , would be essentially the same as that obtained by solving the original utility except with the both diffusion and drift effects in (5). Henceforth, it requires that long-term performance, Ji s W Rn0 Ui s 7! RC concerning decision maker i , is measured for the impacts on slower events through the mappings f

T .tf /Q0i x0s .tf / Ji s .x00 ; ui s / D x0s Z tf T C x0s ./Q0i x0s ./ C zTi ./Qi zi ./ C uTis ./Ri ui s ./ d: t0

(42) f

The constant matrices Q0i 2 Rn0 n0 , Q0i 2 Rn0 n0 , Qi 2 Rni ni , and Ri 2 Rmi mi are real, symmetric, and positive semidefinite with Ri invertible. The relative “size” of Q0s , Qi , and Ri again enforces trade-offs between the speeds of slow and fast timescale responses and the size of the control decisions. Next, multiperson planning must take into consideration the fact that the activities of decision makers can interfere with one another. With respect to

348

K.D. Pham and M. Pachter

group interactions (41), decision maker i hence builds a model of other decision makers—their abilities, self-interest intentions, and the like—and to coordinate his/her activities around the predictions that this model makes dxi s .t/ D .A0s xi s .t/ C Bi s ui s .t//dt C ıi s .t/ C G0s dw.t/;

xi s .t0 / D x00 : (43)

Under the assumption of .A0s ; Ci s / detectable, decision maker i is able to make aggregate observations yi s 2 L2F .t0 ; tf I Rqi 0 Cqi i / according to the relation dyi s .t/ D .Ci s x0s .t/ C Di s ui s .t// dt C dvi s .t/;

i D 1; : : : ; N

(44)

where the aggregate observation noise vi s .t/ is an .qi 0 Cqi i /-dimensional stationary Wiener process, has correlation of independent ˚ which is uncorrelated with w.t/ and increments E Œvi s ./ vi s ./Œvi s ./ vi s ./T D Vi s j j with Vi s > 0 for all ; 2 Œt0 ; tf . Moreover, all other decision makers except for decision maker i are endowed with partial knowledge about his/her observation process, in which 1 1 Ci s and Di s , i Di s with scalars i s 2 RC Ci s , i s s dyQi s .t/ D .Ci s xi s .t/ C Di s ui s .t// dt C di s .t/

(45)

where the measurement noise i s .t/ is an .qi 0 C qi i /-dimensional stationary Wiener process that correlates correlation of ˚ with neither w.t/ nor vi s .t/, while its independent increments E Œi s ./ i s ./Œi s ./ i s ./T D Ni s j j with Ni s > 0 for all ; 2 Œt0 ; tf . As such, the perpetual signal and nominal driving term ıi s 2 L2F .t0 ; tf I Rn0 /, is generated and imposed by all neighbors around decision maker i ıi s .t/ D Li s .t/ ŒdyQi s .t/ .Ci s xO i s .t/ C Di s ui s .t// dt ;

(46)

from which the interference intensity Li s 2 C.t0 ; tf I Rn0 .qi 0 Cqi i / / is yet to be defined. For greater mathematical tractability, each decision maker i with selfinterest decides to retain an approximation of his/her group interactions via a model-reference estimator with filter estimates xO i s 2 L2F .t0 ; tf I Rn0 / and initial values xO i s .t0 / D x00 dxO i s .t/ D .A0s xO i s .t/CBi s ui s .t// dt C Li s .t/Œdyi s .t/ .Ci s xO i s .t/ C Di s ui s .t//dt (47) where the interaction estimate gain Li s 2 C.t0 ; tf I Rn0 .qi 0 Cqi i / / is determined in accordance with the minimax differential game subject to the aggregate interference Li s .t/di s .t/ for t 2 Œt0 ; tf from the group dxQ i s .t/ D .A0s Li s .t/Ci s C Li s .t/Ci s / xQ i s .t/dt CG0s dw.t/ Li s .t/dvi s .t/ C Li s .t/di s .t/;

xQ i s .t0 / D 0 :

(48)

Modeling Interactions in Complex Systems

349

The objective of minimax estimation is minimized by Li s and maximized by Li s as

Jies .Li s ; Li s / D Tr Mi s .tf / EfxQ i1s .tf /.xQ i1s /T .tf / xQ i2s .tf /.xQ i2s /T .tf /g

Z CTr

tf t0

Mi s ./ EfxQ i1s ./.xQ i1s /T ./ xQ i2s ./.xQ i2s /T ./g d

wherein the weighting Mi s 2 C.t0 ; tf I Rn0 n0 / for all the estimation errors is positive definite and the estimate errors xQ i1s 2 L2F .t0 ; tf I Rn0 / and xQ i2s 2 L2F .t0 ; tf I Rn0 / with the initial values xQ i1s .t0 / D 0 and xQ i2s .t0 / D 0 satisfy the stochastic differential equations dxQ i1s .t/ D .A0s Li s .t/Ci s C Li s .t/Ci s / xQ i1s .t/dt C G0s dw.t/ Li s .t/dvi s .t/ dxQ i2s .t/ D .A0s Li s .t/Ci s C Li s .t/Ci s / xQ i2s .t/dt C Li s .t/di s .t/ provided the assumption of xQ i s .t/ , xQ i1s .t/ C xQ i2s .t/ with the constraint (48). As originally shown in [7], the differential game with estimation interference possesses a saddle-point equilibrium .Li s ; Li s / such that Jies .Li s ; Li s / Jies .Li s ; Li s / Jies .Li s ; Li s / is satisfied when decision maker i and the remaining group searg min e lect their strategies Li s D Ji s .Li s ; Li s / D Pi s .t/CiTs and Li s D Li s arg max e T J .L ; Li s / D Pi s .t/Ci s subject to estimate-error covariances Pi s 2 Li s i s i s C 1 .t0 ; tf I Rn0 n0 / satisfying Pi s .t0 / D 0 d T T Pi s .t/ D A0s Pi s .t/C Pi s .t/AT0s C G0s W G0s Pi s .t/.CiTs Ci s Ci s Ci s /Pi s .t/: dt (49) Thus far, the risk-bearing decisions of individual decision makers have been considered only in fast interactions. But it is also possible to respond to risk in slow interactions as well. Here, when it comes to decisions under uncertainty, it is not immediately evident how a ranking of consequences leads to an ordering of actions, since each action will simply imply a chi-squared probabilistic mix of performance whose description (42) is now rewritten conveniently for the sequel analysis f

Ji s .x00 I ui s / D xiTs .tf /Q0i s xi s .tf / Z tf T C xi s ./Q0i s xi s ./ C 2xiTs ./Qi s ui s ./ t0

C uTis ./Ri s ui s ./ d

(50)

350

K.D. Pham and M. Pachter

T 1 wherein the constant weighting matrices Q0i s , Q0i C .A1 i i Ai 0 / Qi .Ai i Ai 0 /, f 1 1 1 T 1 Qi s , .Ai i Ai 0 /Qi .Ai i Bi i /, Ri s , Ri C .Ai i Bi i / Qi .Ai i Bi i /, and Q0i s , f Q0i . Having been dissatisfied with the perceived level of utility risk, individual decision maker decides to construct his/her action repertoire. The objective for each decision maker is the reliable attainment of his/her own utility and preferences (50) by choosing appropriate decision strategies for the underlying linear dynamical system (43) and its approximation (47) and (48). The noncooperative aspect ıi s governed by (46) implies that the other decision makers have been assumed not to collaborate in trying to attain this goal reliably for decision maker i . Depending on the information i s and the set of strategies i s the decision makers like to choose from, the actions of the decision makers are then determined by the relations; that is, i s W i s 7! Ui s and ui s D i s .i s /. Henceforth, the performance value of (50) and its robustness depend on the information i s that decision maker i has for interactions and his/her strategy space. Furthermore, the performance distribution of (50) obviously also depends for each decision maker i on the pursued actions ıi s of the other decision makers. With interests of mutual modeling and self-direction, each decision maker no longer needs prior knowledge of the remaining decision makers’ decisions and thus cannot be certain of how the other decision makers select their pursued actions. It is reasonable to assume that decision maker i may instead choose to optimize his/her decision and performance against the worst possible set of decision strategies, which the other decision makers could choose. Henceforth, it is assumed that decision makers are constrained to use minimax-state estimates xO i s .t/ for their responsive decision implementation. Due to the fact that the interaction model (47) and (48) is linear and the path-wise performance-measure (50) is quadratic, the information structure for optimal decisions is now considered to be linear. Therefore, it is reasonable to restrict the search for the optimal decision laws to linear time-varying decision feedback laws generated from the minimax-state estimates xO i s .t/. That is, i s , .t; xO i s .t// and i s , fui s .t/ D i s .t; xO i s .t// and ui s 2 Ui s g for i D 1; : : : ; N . In view of the common knowledge (47) and state-decision coupling utility (50), it is reasonable to construct probing decisions that can bring to bear additional information about expected performance and its certainty according to the relation

ui s .t/ , Ki s .t/xO i s .t/ C pi s .t/ ;

i D 1; : : : ; N

(51)

wherein the admissible slow timescale decision gain Ki s 2 C.t0 ; tf I Rmi n0 / and affine slow timescale correction pi s 2 C.t0 ; tf I Rmi / are to be determined in some appropriate sense. What next are the aggregate interactions (47) and (48) by decision maker i with self-interest, which come from the implementation of action (51) dzi s .t/ D .Fi s .t/zi s .t/ C li s .t//dt C Gi s .t/dwi s .t/ ;

zi s .t0 / D z0is

(52)

Modeling Interactions in Complex Systems

351

where the aggregate system states, parameters, and process disturbances are given by " zi s ,

xO i s xQ i s

" Fi s ,

"

# ; zi s .t0 / ,

3 3 2 w W 0 0 7 7 6 6 ; li s ; wi s , 4 vi s 5 ; Wi s , 4 0 Vi s 0 5 i s 0 0 Ni s " # # 0 Li s Li s Ci s 0 ; Gi s , G0s Li s Li s Li s Ci s C Li s Ci s

x00 0

A0s C Bi s Ki s 0 A0s

#

"

Bi s pi s 0

#

EfŒwi s ./ wi s ./Œwi s ./ wi s ./T g D Wi s j j ;

2

8; 2 Œt0 ; tf :

Then, for given admissible affine pi s and feedback decision Ki s , the performancemeasure (42) is seen as the “cost-to-go,” Ji s .˛; z˛is / when parameterizing the initial condition .t0 ; z0is / to any arbitrary pair .˛; z˛is / f

Ji s .˛; z˛is / D zTis .tf /Oi s zi s .tf / Z tf T C zi s ./Oi s ./zi s ./ C 2zTis ./Ni s ./ ˛

wherein

CpiTs ./Ri s pi s ./ d

(53)

" # f f KiTs Ri s pi s C Qi s pi s Qi 0 Qi 0 f ; Oi s , Ni s , f f Q i s pi s Qi 0 Qi 0 Q0i s C KiTs Ri s Ki s C 2Qi s Ki s Q0i s : Oi s , Q0i s C 2Qi s Ki s Q0i s

So far there are two types of information, i.e., process information (52) and goal information (53) have been given in advance to the control decision policy (51). Since there is the external disturbance wi s ./ affecting the closed-loop performance, the control decision policy now needs additional information about performance variations. This is coupling information and thus also known as performance information. The questions of how to characterize and influence performance information are then answered by adaptive cumulants (aka semi-invariants) associated with the performance-measure (53) in details below. Associated with each decision maker i , the first and second characteristic functions or the moment and cumulant-generating functions of (53) are defined by ˚ 'i s ˛; z˛is I i s , E exp i s Ji s ˛; z˛is (54) ˛ ˚ ˛ (55) i s ˛; zi s I i s , ln 'i s ˛; zi s I i s for some small parameters i s in an open interval about 0 while lnfg denotes the natural logarithmic transformation of the first characteristic function.

352

K.D. Pham and M. Pachter

Theorem 6 (Slow Interactions—cumulant-Generating Function). Let i s be a small positive parameter and ˛ 2 Œt0 ; tf be a running variable. Further let 'i s ˛; z˛is I i s D %i s .˛I i s / expf.z˛is /T i s .˛I i s /z˛is C 2.z˛is /T i s .˛I i s /g (56) i s .˛I i s / D lnf%i s .˛I i s /g ;

i D 1; : : : ; N

(57)

Under the assumption of .A0s ; Bi s / and .A0s ; Ci s / stabilizable and detectable, the cumulant-generating function that compactly and robustly represents the uncertainty of performance distribution (53) is given by ˛ i s .˛; zi s I i s /

D .z˛is /T i s .˛I i s /z˛is C 2.z˛is /T i s .˛I i s / C i s .˛I i s /

(58)

subject to d

i s .˛I i s / D FiTs .˛/ i s .˛I i s / i s .˛I i s /Fi s .˛/ i s Oi s .˛/ d˛ f

2 i s .˛I i s /Gi s .˛/Wi s GiTs .˛/ i s .˛I i s /; i s .tf I i s / D i s Oi s (59) d i s .˛I i s / D FiTs .˛/i s .˛I i s / i s .˛I i s /li s .˛/ i s Ni s .˛/ d˛ i s .tf I i s / D 0

(60)

d i s .˛I i s / D Trf i s .˛I i s /Gi s .˛/Wi s GiTs .˛/g 2Tis .˛I i s /li s .˛/ d˛ i s piTs .˛/Ri s pi s .˛/ ;

i s .tf I i s / D 0 :

(61)

Proof. For shorthand notations, it is convenient to let the first characteristic function denoted by $i s .˛; z˛is I i s / , expf i s Ji s .˛; z˛is /g. The moment-generating function becomes 'i s .˛; z˛is I i s / D Ef$i s .˛; z˛is I i s /g with time derivative of d 'i s .˛; z˛is I i s / d˛ D i s .z˛is /T Oi s .˛/z˛is C 2.z˛is /T Ni s .˛/ C piTs .˛/Ri s pi s .˛/ 'i s .˛; z˛is I i s / : Using the standard Ito’s formula, one gets d'i s .˛; z˛is I i s / D Efd$i s .˛; z˛is I i s /g D

@ @ 'i s .˛; z˛is I i s /d˛ C ˛ 'i s .˛; z˛is I i s / Fi s .˛/z˛is C li s .˛/ d˛ @˛ @zi s

1 @2 ˛ T 'i s .˛; zi s I i s /Gi s .˛/Wi s Gi s .˛/ d˛ C Tr 2 @.z˛is /2

Modeling Interactions in Complex Systems

353

when combined with (56) leads to i s .z˛is /T Oi s .˛/z˛is C 2.z˛is /T Ni s .˛/ C piTs .˛/Ri s pi s .˛/ 'i s .˛; z˛is I i s / ( d %i s .˛I i s / d d D d˛ C .z˛is /T

i s .˛I i s /z˛is C 2.z˛is /T i s .˛I i s / %i s .˛I i s / d˛ d˛ C .z˛is /T i s .˛I i s /Fi s .˛/z˛is C .z˛is /T FiTs .˛/ i s .˛I i s /z˛is C 2.z˛is /T i s .˛I i s /li s .˛/ C 2.z˛is /T FiTs .˛/i s .˛I i s / ˚ C 2Tis .˛I i s /li s .˛/ C Tr i s .˛I i s /Gi s .˛/Wi s GiTs .˛/ ) C 2.z˛is /T i s .˛I i s /Gi s .˛/Wi s GiTs .˛/ i s .˛I i s /z˛is 'i s .˛; z˛is I i s /: (62) To have all terms in (62) to be independent of arbitrary z˛is , it requires the matrix, vector, and scalar-valued differential equations (59)–(61) with the terminal-value conditions hold true. t u By definition, the mathematical statistics associated with (53) that provide performance information for the decision process taken by decision maker i can best be generated by the MacLaurin series expansion of the cumulant-generating function (58) ˛ i s .˛; zi s I i s / ,

1 X ki s D1

D

1 X ki s D1

iksi s

. i s /ki s ki s Š

@.ki s / @. i s /.ki s /

ˇ ˇ

˛ ˇ i s .˛; zi s I i s /ˇ

i s D0

. i s /ki s ki s Š

(63)

in which iksi s ’s are called the performance-measure statistics associated with decision maker i for i D 1; : : : ; N . Notice that the series coefficients in (63) are identified as ˇ ˇ ˇ ˇ @.ki s / @.ki s / ˛ ˛ T ˇ ˇ .˛; z I / D .z /

.˛I / z˛is is is ˇ is is ˇ i s i s .k / .k / is @. i s / i s @. / i s i s D0 i s D0 ˇ .ki s / ˇ @ ˛ T C 2.zi s / i s .˛I i s /ˇˇ @. i s /.ki s / i s D0 ˇ .ki s / ˇ @ C i s .˛I i s /ˇˇ : (64) .k / i s @. i s / i s D0

354

K.D. Pham and M. Pachter

For notational convenience, the necessary definitions are introduced as follows: ˇ ˇ ˇ ˇ @.kis / @.kis / ˇ M Hi s .˛; ki s / ,

i s .˛I i s /ˇ ; Di s .˛; ki s / , .˛I i s /ˇˇ .kis / i s @. i s /.kis / @. / is is D0 is D0 ˇ .kis / ˇ @ Di s .˛; ki s / , i s .˛I i s /ˇˇ @. i s /.kis / is D0 which leads to iksi s D .z˛is /T Hi s .˛; ki s /z˛is C 2.z˛is /T DM i s .˛; ki s / C Di s .˛; ki s /: The result below contains a tractable method of generating performance-measure statistics that provides measures of the amount, value, and the design of performance information structures in time domain. This computational procedure is preferred to that of (64) for the reason that the cumulant-generating equations (59)–(61) now allow the incorporation of classes of linear feedback strategies in the statistical control problems. Theorem 7 (Slow Interactions—Performance-Measure Statistics). Assume interaction dynamics by decision maker i and i D 1; : : : ; N is described by (52) and (53) in which the pairs .A0s ; Bi s / and .A0s ; Ci s / are stabilizable and detectable. For ki s 2 N fixed, the ki s th statistics of performance-measure (53) is given by iksi s D .z˛is /T Hi s .˛; ki s /z˛is C 2.z˛is /T DM i s .˛; ki s / C Di s .˛; ki s /:

(65)

is is where the cumulant-generating solutions fHi s .˛; r/gkrD1 , fDM i s .˛; r/gkrD1 , and ki s fDi s .˛; r/grD1 evaluated at ˛ D t0 satisfy the time-backward matrix differential equations (with the dependence upon Ki s .˛/ and pi s .˛/ suppressed)

d Hi s .˛; 1/ D FiTs Hi s .˛; 1/ Hi s .˛; 1/Fi s .˛/ Oi s .˛/ d˛ d Hi s .˛; r/ D FiTs Hi s .˛; r/ Hi s .˛; r/Fi s .˛/ d˛

r1 X sD1

(66)

2rŠ Hi s .˛; s/Gi s .˛/Wi s GiTs .˛/Hi s .˛; r s/ ; sŠ.r s/Š

2 r ki s

(67)

and d M Di s .˛; 1/ D FiTs .˛/DM i s .˛; 1/ Hi s .˛; 1/li s .˛/ Ni s .˛/ d˛ d M Di s .˛; r/ D FiTs .˛/DM i s .˛; r/ Hi s .˛; r/li s .˛/ ; 2 r ki s d˛

(68) (69)

Modeling Interactions in Complex Systems

355

and finally ˚ d Di s .˛; 1/ D Tr Hi s .˛; 1/Gi s .˛/Wi s GiTs .˛/ d˛ 2.DM i s /T .˛; 1/li s .˛/ piTs .˛/Ri s pi s .˛/

(70)

˚ d Di s .˛; r/ D Tr Hi s .˛; r/Gi s .˛/Wi s GiTs .˛/ d˛ 2.DM i s /T .˛; r/li s .˛/ ; 2 r ki s

(71)

f

where the terminal-value conditions are Hi s .tf ; 1/ D Oi s , Hi s .tf ; r/ D 0 for 2 r ki s , DM i s .tf ; r/ D 0 for 1 r ki s , and Di s .tf ; r/ D 0 for 1 r ki s . Proof. The expression of performance-measure statistics (65) is readily justified by using the result (64). What remains is to show that the solutions Hi s .˛; r/, DM i s .˛; r/, and Di s .˛; r/ for 1 r ki s indeed satisfy the dynamical equations (66)– (71). In fact the equations (66)–(71), which are satisfied by the solutions Hi s .˛; r/, DM i s .˛; r/, and Di s .˛; r/ can be obtained by repeatedly taking time derivatives with respect to i s of the supporting equations (59)–(61) together with the assumption of t u .A0s ; Bi s / and .A0s ; Ci s / stabilizable and detectable on t0 ; tf . Remark 4. It is worth the time to observe that this research investigation focuses on the class of optimal statistical control problems whose performance index reflects the intrinsic performance variability introduced by process noise stochasticity. It should also not be forgotten that all the performance-measure statistics (65) depend in part on the initial condition zi s .˛/. Although different states zi s .t/ and t 2 Œ˛; tf will result in different values for the “performance-to-come” (53), the performancemeasure statistics are, however, the functions of time-backward evolutions of the cumulant-generating solutions Hi s .˛; r/, DM i s .˛; r/, and Di s .˛; r/ that totally ignore all the intermediate values zi s .t/. This fact therefore makes the new optimization problem as being considered in optimal statistical control particularly unique, as compared with the more traditional dynamic programming class of investigations. In other words, the time-backward trajectories (66)–(71) should be considered as the “new” dynamical equations for the optimal statistical control, from which the resulting Mayer optimization [5] and associated value function in the framework of dynamic programming therefore depend on these “new” states Hi s .˛; r/, DM i s .˛; r/, and Di s .˛; r/; not the classical states zi s .t/ as in the traditional school of thinking. In the design of a decision process in which the information process about performance variations is embedded with Ki s and pi s , it is convenient to rewrite the results (66)–(71) in accordance of the following matrix and vector partitions: 11 11 M Hi s .; r/ Hi12 s .; r/ ; M i s .; r/ D Di s .; r/ D Hi s .; r/ D 22 Hi21 DM i21s .; r/ s .; r/ Hi s .; r/ s s ˘11 ./ ˘12 ./ Gi s ./Wi s GiTs ./ D s s ./ ˘22 ./ ˘21

356

K.D. Pham and M. Pachter

s s s s provided that the shorthand notations ˘11 D Li s Vi s .Li s /T , ˘12 D ˘21 D ˘11 , s T T T and ˘22 D G0s W G0s CLi s Vi s .Li s / CLi s Ni s .Li s / ; wherein the second-order statistics associated with the .q0i C qi i /-dimensional stationary Wiener process vi s is given by

p V0i C "i .Ci A1 Gi /W .Ci A1 Gi /T "i .Ci A1 Gi /W .Ci i A1 Gi /T i i i i i i i i : Vi s D 1 T 0 Vi i C .Ci i A1 i i Gi /W .Ci i Ai i Gi /

For notational simplicity, ki s -tuple variables Hi11s ./, Hi12s ./, Hi21s ./, Hi22s ./, DM i11s ./, DM 21 ./, and Di s ./ are introduced as the new dynamical states for decision maker i is

11 Hi11s ./ , .Hi11s;1 ./; : : : ; Hi11s;ki s .// .Hi11 s .; 1/; : : : ; Hi s .; ki s // 12 Hi12s ./ , .Hi12s;1 ./; : : : ; Hi12s;ki s .// .Hi12 s .; 1/; : : : ; Hi s .; ki s // 21 Hi21s ./ , .Hi21s;1 ./; : : : ; Hi21s;ki s .// .Hi21 s .; 1/; : : : ; Hi s .; ki s // 22 Hi22s ./ , .Hi22s;1 ./; : : : ; Hi22s;ki s .// .Hi22 s .; 1/; : : : ; Hi s .; ki s //

DM i11s ./ , .DM i11s;1 ./; : : : ; DM i11s;ki s .// .DM i11s .; 1/; : : : ; DM i11s .; ki s // DM i21s ./ , .DM i21s;1 ./; : : : ; DM i21s;ki s .// .DM i21s .; 1/; : : : ; DM i21s .; ki s // Di s ./ , .Di s;1 ./; : : : ; Di s;ki s .// .Di s .; 1/; : : : ; Di s .; ki s // which are satisfying the matrix, vector, and scalar-valued differential equations (66)–(71). Furthermore, the right members of the matrix, vector, and scalar-valued differential equations (66)–(71) are considered as the mappings on the Œt0 ; tf with the rules of action 11 12 21 T 11 Fi11 s;1 .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// , .A0s C Bi s Ki s .˛// Hi s .˛; 1/ T Hi11 s .˛; 1/.A0s C Bi s Ki s .˛// Q0i s Ki s .˛/Ri s Ki s .˛/ 2Qi s Ki s .˛/

(72)

when 2 r ki s 11 12 21 Fi11 s;r .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// 11 , .A0s C Bi s Ki s .˛//T Hi11 s .˛; r/ Hi s .˛; r/.A0s C Bi s Ki s .˛// r1 X vD1

11 11 2rŠ s s Hi s .˛; v/˘11 .˛/ C Hi12 s .˛; v/˘21 .˛/ Hi s .˛; r v/ vŠ.r v/Š

r1 X vD1

21 11 2rŠ s s .˛/ C Hi12 Hi s .˛; v/˘12 s .˛; v/˘22 .˛/ Hi s .˛; r v/ (73) vŠ.r v/Š

Modeling Interactions in Complex Systems

357

11 12 22 Fi12 s;1 .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// 11 , .A0s C Bi s Ki s .˛//T Hi12 s .˛; 1/ Hi s .˛; 1/.Li s .˛/Ci s / Hi12 s .˛; 1/.A0s Li s .˛/Ci s C Li s .˛/Ci s / Q0i s

(74)

when 2 r ki s 11 12 22 T 12 Fi12 s;r .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// , .A0s C Bi s Ki s .˛// Hi s .˛; r/ 12 Hi11 s .˛; r/.Li s .˛/Ci s / Hi s .˛; r/.A0s Li s .˛/Ci s C Li s .˛/Ci s /

r1 X vD1

r1 X vD1

11 12 2rŠ s s Hi s .˛; v/˘11 .˛/ C Hi12 s .˛; v/˘21 .˛/ Hi s .˛; r v/ vŠ.r v/Š 11 22 2rŠ s s Hi s .˛; v/˘12 .˛/ C Hi12 s .˛; v/˘22 .˛/ Hi s .˛; r v/ (75) vŠ.r v/Š

11 21 22 Fi21 s;1 .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// , Q0i s 2Qi s Ki s .˛/

.A0s Li s .˛/Ci s C Li s .˛/Ci s /T Hi21 s .˛; 1/ T 11 Hi21 s .˛; 1/.A0s C Bi s Ki s .˛// .Li s .˛/Ci s / Hi s .˛; 1/

(76)

when 2 r ki s 11 21 22 21 Fi21 s;1 .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// , Hi s .˛; r/.A0s C Bi s Ki s .˛// T 11 .A0s Li s .˛/Ci s C Li s .˛/Ci s /T Hi21 s .˛; r/ .Li s .˛/Ci s / Hi s .˛; r/

r1 X vD1

r1 X vD1

21 11 2rŠ s s Hi s .˛; v/˘11 .˛/ C Hi22 s .˛; v/˘21 .˛/ Hi s .˛; r v/ vŠ.r v/Š 21 21 2rŠ s s Hi s .˛; v/˘12 .˛/ C Hi22 s .˛; v/˘22 .˛/ Hi s .˛; r v/ (77) vŠ.r v/Š

12 21 22 T 12 Fi22 s;1 .˛; Hi s .˛/; Hi s .˛/; Hi s .˛// , .Li s .˛/Ci s / Hi s .˛; 1/

.A0s Li s .˛/Ci s C Li s .˛/Ci s /T Hi22 s .˛; 1/ Q0i s 21 Hi22 s .˛; 1/.A0s Li s .˛/Ci s C Li s .˛/Ci s / Hi s .˛; 1/.Li s .˛/Ci s / (78)

when 2 r ki s 12 21 22 T 12 Fi22 s;r .˛; Hi s .˛/; Hi s .˛/; Hi s .˛// , .Li s .˛/Ci s / Hi s .˛; r/

.A0s Li s .˛/Ci s C Li s .˛/Ci s /T Hi22 s .˛; r/

358

K.D. Pham and M. Pachter 21 Hi22 s .˛; r/.A0s Li s .˛/Ci s C Li s .˛/Ci s / Hi s .˛; r/.Li s .˛/Ci s /

r1 X vD1

r1 X vD1

21 12 2rŠ s s Hi s .˛; v/˘11 .˛/ C Hi22 s .˛; v/˘21 .˛/ Hi s .˛; r v/ vŠ.r v/Š 21 22 2rŠ s s Hi s .˛; v/˘12 .˛/ C Hi22 s .˛; v/˘22 .˛/ Hi s .˛; r v/ (79) vŠ.r v/Š

T M 11 M 11 GM i11s;1 .˛; Hi11 s .˛/; Di s .˛/; Ki s .˛/; pi s .˛// , .A0s C Bi s Ki s .˛// Di s .˛; 1/ T Hi11 s .˛; 1/Bi s pi s .˛/ Ki s .˛/Ri s pi s .˛/ Qi s pi s .˛/

(80)

when 2 r ki s T M 11 M 11 GM i11s;r .˛; Hi11 s .˛/; Di s .˛/; Ki s .˛/; pi s .˛// , .A0s C Bi s Ki s .˛// Di s .˛; r/

Hi11 s .˛; r/Bi s pi s .˛/

(81)

T M 11 M 11 M 21 GM i21s;1 .˛; Hi21 s .˛/; Di s .˛/; Di s .˛/; pi s .˛// , .Li s .˛/Ci s / Di s .˛; 1/

.A0s Li s .˛/Ci s CLi s .˛/Ci s /TDM i21s .˛; 1/Hi21 s .˛; 1/Bi s pi s .˛/Qi s pi s .˛/ (82) when 2 r ki s T M 11 M 11 M 21 GM i21s;r .˛; Hi21 s .˛/; Di s .˛/; Di s .˛/; pi s .˛// , .Li s .˛/Ci s / Di s .˛; r/

.A0s Li s .˛/Ci s C Li s .˛/Ci s /T DM i21s .˛; r/ Hi21 s .˛; r/Bi s pi s .˛/

(83)

12 21 22 M 11 Gi s;1 .˛; Hi11 s .˛/; Hi s .˛/; Hi s .˛/; Hi s .˛/; Di s .˛/; pi s .˛// ˚ ˚ 12 s s , 2.DM i11s .˛; 1//T Bi s pi s .˛/ Tr Hi11 s .˛; 1/˘11 .˛/ C Tr Hi s .˛; 1/˘21 .˛/ ˚ 22 ˚ s s T (84) Tr Hi21 s .˛; 1/˘12 .˛/ C Tr Hi s .˛; 1/˘22 .˛/ pi s .˛/Ri s pi s .˛/

when 2 r ki s 12 21 22 M 11 Gi s;r .˛; Hi11 s .˛/; Hi s .˛/; Hi s .˛/; Hi s .˛/; Di s .˛/; pi s .˛// ˚ ˚ 12 s s , 2.DM i11s .˛; r//T Bi s pi s .˛/ Tr Hi11 s .˛; r/˘11 .˛/ C Tr Hi s .˛; r/˘21 .˛/ ˚ ˚ 22 s s Tr Hi21 (85) s .˛; r/˘12 .˛/ C Tr Hi s .˛; r/˘22 .˛/ :

The product system of the dynamical equations (66)–(71), whose mappings are constructed by the Cartesian products of the constituents of (72)–(85), for example, 11 11 12 12 12 21 21 21 Fi11 s , Fi s;1 Fi s;ki s , Fi s , Fi s;1 Fi s;ki s , Fi s , Fi s;1 Fi s;ki s , 22 Fi22 F 22 , GMi11s , GM 11 GM 11 , GMi21s , GM 21 GM 21 , s , F i s;1

i s;ki s

i s;1

i s;ki s

i s;1

i s;ki s

Modeling Interactions in Complex Systems

359

and Gi s , Gi s;1 Gi s;ki s in the optimal statistical control with output-feedback compensation, is described by d 11 11 12 21 H .˛/ D Fi11 Hi11s .tf / (86) s .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// ; d˛ i s d 12 11 12 22 Hi12s .tf / (87) H .˛/ D Fi12 s .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// ; d˛ i s d 21 11 21 22 H .˛/ D Fi21 Hi21s .tf / (88) s .˛; Hi s .˛/; Hi s .˛/; Hi s .˛/; Ki s .˛// ; d˛ i s d 22 12 21 22 H .˛/ D Fi22 Hi22s .tf / (89) s .˛; Hi s .˛/; Hi s .˛/; Hi s .˛// ; d˛ i s d M 11 (90) D .˛/ D GMi11s .˛; Hi11s .˛/; DM i11s .˛/; Ki s .˛/; pi s .˛// ; DM i11s .tf / d˛ i s d M 21 (91) D .˛/ D GMi21s .˛; Hi21s .˛/; DM i11s .˛/; DM i21s .˛/; pi s .˛// ; DM i21s .tf / d˛ i s d Di s .˛/ D Gi s .˛; Hi11s .˛/; Hi12s .˛/; Hi21s .˛/; Hi22s .˛/; DM i11s .˛/; pi s .˛// ; Di s .tf / d˛ (92) wherein the terminal-value conditions Hi11s .tf / D Hi12s .tf / D Hi21s .tf / D f Hi22s .tf / , Q0i 0 0, DM i11s .tf / D DM i21s .tf / , 0„ ƒ‚ …0, and DM i s .tf / , „ ƒ‚ … ki s -times ki s -times 0 0 . „ ƒ‚ … ki s -times As for the problem statements of the control decision optimization concerned by decision maker i , the product systems (86)–(92) of the dynamical equations (66)– 12 21 22 (71) are now further described in terms of Fi s , Fi11 s Fi s Fi s Fi s and 11 21 GMi s , GM GM is

is

d Hi s .˛/ D Fi s .˛; Hi s .˛/; Ki s .˛// ; Hi s .tf / d˛ d M DM i s .tf / Di s .˛/ D GMi s .˛; Hi s .˛/; DM i s .˛/; Ki s ; pi s .˛// ; d˛ d Di s .˛/ D Gi s .˛; Hi s .˛/; DM i s .˛/; pi s .˛// ; Di s .tf / d˛

(93) (94) (95)

whereby the terminal-value conditions Hi s .tf / , .Hi11s .tf /; Hi12s .tf /; Hi21s .tf /; Hi22s .tf //, and DM i s .tf / , .DM i11s .tf /; DM i21s .tf //. Recall that the aim is to determine risk-bearing decision ui s so as to minimize the performance vulnerability of (53) against all sample-path realizations of the underlying stochastic environment wi s . Henceforth, performance risks are interpreted

360

K.D. Pham and M. Pachter

as worries and fears about certain undesirable characteristics of performance distributions of (53) and thus are proposed to manage through a finite set of selective weights. This custom set of design freedoms representing particular uncertainty aversions decision maker i is hence different from the ones with aversion to risk captured in risk-sensitive optimal control [8, 9]; just to name a few. Definition 7 (Slow Interactions—Risk-Value Aware Performance Index). With reference to Li s and Li s being conducted optimally, the new performance index for slow interactions; that is, i0s W ft0 g .Rn0 n0 /ki s .Rn0 /ki s Rki s 7! RC with ki s 2 N is defined as a multi-criteria objective using the first ki s performancemeasure statistics of the integral-quadratic utility (53), on the one hand, and a value and risk model, on the other, to reflect the trade-offs between reliable attainments and risks i0s ,

1is i1s C 2is i2s C C ki si s iksi s „ƒ‚… „ ƒ‚ … Standard Measure Risk Measures

(96)

where the rth performance-measure statistics irs irs .t0 ; Hi s .t0 /; DM i s .t0 /; Di s T T M 11 .t0 // D x00 Hi11s;r .t0 /x00 C 2x00 Di s;r .t0 / C Di s;r .t0 /, while the dependence of Hi s , M Di s , and Di s on certain admissible Ki s and pi s is omitted for notational simplicity. is In addition, parametric design measures ris from the sequence i s D fris 0gkrD1 1 with i s > 0 concentrate on various prioritizations as chosen by decision maker i toward his/her trade-offs between performance robustness and high performance demands. To specifically indicate the dependence of the risk-value aware performance index (96) expressed in Mayer form on ui s and the set of interferences from all other decision makers ıi s , the multi-criteria objective (96) for decision maker i is now rewritten as i0s .ui s I ıi s /. In view of this multiperson decision problem, a noncooperative Nash equilibrium ensures that no decision makers have incentive to unilaterally deviate from the equilibrium decisions in order to further optimize their performance. Henceforth, a Nash game-theoretic framework is suitable to capture the nature of conflicts as actions of a decision maker are tightly coupled with those of other remaining decision makers. Definition 8 (Slow Interactions—Nash Equilibrium). An admissible set of actions .u1s ; : : : ; uN s / is a Nash equilibrium for an N -person stochastic game where each decision maker i and i D 1; : : : ; N has the performance index i0s .ui s I ıi s / of Mayer type, if for all admissible .u1s ; : : : ; uN s / the following inequalities hold: 0 i0s .ui s I ıi s / i s .ui s I ıi s /;

i D 1; : : : ; N:

When solving for a Nash equilibrium solution, it is very important to realize that N decision makers have different performance indices to minimize. A standard approach for a potential solution from the set of N inequalities as stated above is

Modeling Interactions in Complex Systems

361

to solve jointly N optimal control decision problems defined by these inequalities, each of which depends structurally on the other decision maker’s decision laws. However, a Nash equilibrium solution cannot be unique due to informational nonuniqueness. The problems with informational nonuniqueness under the feedback information pattern and the need for more satisfactory resolution have been addressed via the requirement of a Nash equilibrium solution to have an additional property that its restriction on either the final part Œt; tf or the initial part Œt0 ; " is a Nash solution to the truncated version of either traditional games with terminal costs or the statistics-based games with initial costs herein, defined on either Œt; tf or Œt0 ; ", respectively. With such a restriction so defined, the solution is now termed as a feedback Nash equilibrium solution, which is now free of any informational nonuniqueness, and thus whose derivation allows a dynamic programming type argument. In conformity with the rigorous formulation of dynamic programming, the following development is important. Let the terminal time tf and states .Hi s .tf /; DM i s .tf /; Di s .tf // be given. Then the other end condition involved the initial time t0 and corresponding states .Hi s .t0 /; DM i s .t0 /; Di s .t0 // are specified by a target set requirement. Definition 9 (Slow Interactions—Target Sets). .t0 ; Hi s .t0 /; DM i s .t0 /; Di s .t0 // 2 O i s where the target set M O i s and i D 1; : : : ; N is a closed subset of ft0 g M .Rn0 n0 /4ki s .Rn0 /2ki s Rki s . f For the given terminal data .tf ; Hi s .tf /; DM i s .tf /; Di s .tf // wherein Hi s , Hi s .tf /, f f i s , DM i s .tf /, and D , Di s .tf /, the classes KO and DM f f f is

is

PO i s f M f f i s tf ;Hi s ;Di s ;Di s I

M i s ;Di s Ii s tf ;Hi s ;D

of admissible feedback decisions are now defined as follows.

Definition 10 (Slow Interactions—Admissible Feedback Sets). Let the compact subset Ki s Rmi n0 and P i s Rmi be the respective sets of allowable values. is For the given ki s 2 N and the sequence i s D fris 0gkrD1 with 1is > 0, i s i s let KO and PO be the classes of C.Œt0 ; tf I Rmi n0 / and f Mf f f Mf f is is tf ;Hi s ;Di s ;Di s I

tf ;Hi s ;Di s ;Di s I

C.Œt0 ; tf I Rmi / with values Ki s ./ 2 Ki s and pi s ./ 2 P i s , for which the risk-value aware performance index (23) is finite and the trajectory solutions to the dynamic O i s and i D 1; : : : ; N . equations (93)–(95) reach .t0 ; Hi s .t0 /; DM i s .t0 /; Di s .t0 // 2 M In the sequel, when decision maker i is confident that other N 1 decision makers choose their feedback Nash equilibrium strategies, that is, .K1s ; p1s /, : : : , .K.i 1/s ; p.i 1/s /, .K.i C1/s ; p.i C1/s /, : : : , .KN s ; pN s /. He/she then uses his/her feedback Nash equilibrium strategy .Kis ; pis /. Definition 11 (Slow Interactions—Feedback Nash Equilibrium). Let ui s .t/ D Kis .t/xO i s .t/ C pis .t/, or equivalently .Kis ; pis / constitute a feedback Nash equilibrium such that 0 i0s .Kis ; pis I ıi s / i s .Ki s ; pi s I ıi s /;

i D 1; : : : ; N

(97)

362

K.D. Pham and M. Pachter

for all admissible Ki s 2 KO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

and pi s 2 PO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

, upon which

the solutions to the dynamical systems (93)–(95) exist on Œt0 ; tf . Then, ..K1s ; p1s /; : : : ; .KN s ; pN s // when restricted to the interval Œt0 ; ˛ is still a feedback Nash equilibrium for the set of Nash control and decision problems with the appropriate terminal-value conditions .˛; His .˛/; DM is .˛/; Dis .˛// for all ˛ 2 Œt0 ; tf . Now, the decision optimization residing at decision maker i is to minimize the riskvalue aware performance index (96) for all admissible Ki s 2 KO i s f M f f i s and tf ;Hi s ;Di s ;Di s I

pi s 2 PO i s

f Mf f is tf ;Hi s ;D i s ;Di s I

while subject to interferences from all remaining decision

makers ıi s.

Definition 12 (Slow Interactions—Optimization of Mayer Problem). Assume that there exist ki s 2 N, i D 1; : : : ; N , and the sequence of nonnegative scalars is i s D fris 0gkrD1 with 1is > 0. Then, the decision optimization for decision maker i over Œt0 ; tf is given by min

O is K i s 2K

f f f M ;D Ii s tf ;Hi s ;D is is

;pi s 2PO i s

i0s .Ki s ; pi s I ıi s/

(98)

f f f M ;D Ii s tf ;Hi s ;D is is

subject to the dynamic equations (93)–(95), for ˛ 2 Œt0 ; tf . Notice that the optimization considered here is in Mayer form and can be solved by applying an adaptation of the Mayer form verification theorem of dynamic programming given in [5]. To embed the aforementioned optimization into a larger optimization problem, the terminal time and states .tf ; Hi s .tf /; DM i s .tf /; Di s .tf // are parameterized as ."; Yi s ; ZMi s ; Zi s / whereby Yi s , Hi s ."/, ZMi s , DM i s ."/, and Zi s , Di s ."/. Thus, the value function for this optimization problem is now depending on parameterizations of terminal-value conditions. Definition 13 (Slow Interactions—Value Function). Let ."; Yi s ; ZMi s ; Zi s / 2 Œt0 ; tf .Rn0 n0 /4ki s .Rn0 /2ki s Rki s be given. Then, the value function Vi s ."; Yi s ; ZMi s ; Zi s / associated with decision maker i and i D 1; : : : ; N is defined by Vi s ."; Yi s ; ZMi s ; Zi s / D

O is Kis 2K

inf

O is f Mf f is ;pis 2P f Mf f is tf ;His ;D tf ;His ;D is ;Dis I is ;Dis I

i0s .Ki s ; pi s I ıi s /: (99)

It is conventional to let Vi s ."; Yi s ; ZMi s ; Zi s / D C1 when either KO i s or PO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

is empty.

Unless otherwise specified, the dependence of trajectory solutions Hi s ./, DM i s ./, and Di s ./ on .Ki s ; pi s I ıi s / is now omitted for notational clarity. The results that

Modeling Interactions in Complex Systems

363

follow summarize some properties of the value function as necessary conditions for optimality whose verifications can be obtained via parallel adaptations [6] to those of excellent treatments in [5]. Theorem 8 (Slow Interactions—Necessary Conditions). The value function associated with decision maker i and i D 1; : : : ; N evaluated along any timebackward trajectory corresponding to a feedback decision feasible for its terminal states is an increasing function of time. Moreover, the value function evaluated along any optimal time-backward trajectory is constant. As far as a construction of scalar-valued functions Wi s ."; Yi s ; ZMi s ; Zi s /, which then serve as potential candidates for the value function, is concerned, these necessary conditions are also sufficient for optimality as shown in the next result. Theorem 9 (Slow Interactions—Sufficient Condition). Let Wi s ."; Yi s ; ZMi s ; Zi s / be an extended real-valued function on Œt0 ; tf .Rn0 n0 /4ki s .Rn0 /2ki s Rki s such that Wi s ."; Yi s ; ZMi s ; Zi s / i0s ."; Yi s ; ZMi s ; Zi s I ıi s / for decision maker i f f f and i D 1; : : : ; N . Further, let tf , Hi s , DM i s , and Di s be given the terminalvalue conditions. Suppose, for each trajectory .Hi s ; DM i s ; Di s / corresponding to a permissible decision strategy .Ki s ; pi s / in KO i s f M f f i s and PO i s f M f f i s , tf ;Hi s ;Di s ;Di s I tf ;Hi s ;Di s ;Di s I that Wi s ."; Yi s ; ZMi s ; Zi s / is finite and time-backward increasing on t0 ; tf . If .Kis ; pis / is a permissible strategy in KO i s f M f f i s and PO i s f M f f i s tf ;Hi s ;Di s ;Di s I .His ; DM is ; Dis /,

tf ;Hi s ;Di s ;Di s I

such that for the corresponding trajectory Wi s ."; Yi s ; ZMi s ; Zi s / is constant then .Ki s ; pi s / is a feedback Nash strategy. Therefore, Wi s ."; Yi s ; ZMi s ; Zi s / Vi s ."; Yi s ; ZMi s ; Zi s /. Proof. Given the space limitation, the detailed analysis and development are now referred to the work by the first author [6]. Definition 14 (Slow Interactions—Reachable Sets). Let reachable set fQO i s gN i D1 for decision maker i be defined as follows n QO i s , ."; Yi s ; ZMi s ; Zi s / 2 Œt0 ; tf .Rn0 n0 /4ki s .Rn0 /2ki s Rki s o such that KO i s f M f f i s ¤ ; and PO i s f M f f i s ¤ ; : tf ;Hi s ;Di s ;Di s I

tf ;Hi s ;Di s ;Di s I

Moreover, it can be shown that the value function associated with decision maker i is satisfying a partial differential equation at each interior point of QO i s at which it is differentiable. Theorem 10 (Slow Interactions—Hamilton–Jacobi–Bellman (HJB) Equation). Let ."; Yi s ; ZMi s ; Zi s / be any interior point of the reachable set QO i s , at which the value function Vi s ."; Yi s ; ZMi s ; Zi s / is differentiable. If there exists a feedback Nash equilibrium .Kis ; pis / 2 KO i s f M f f i s PO i s f M f f i s , then the differential equation

tf ;Hi s ;Di s ;Di s I

tf ;Hi s ;Di s ;Di s I

364

K.D. Pham and M. Pachter

( 0D

min

.Ki s ;pi s /2Kif P i s

C C

@ Vi s ."; Yi s ; ZMi s ; Zi s / @"

@ Vi s ."; Yi s ; ZMi s ; Zi s /vec.Fi s ."; Yi s ; Ki s // @ vec.Yi s / @ @ vec.ZMi s /

Vi s ."; Yi s ; ZMi s ; Zi s /vec.GMi s ."; Yi s ; ZMi s ; Ki s ; pi s //

@ C Vi s ."; Yi s ; ZMi s ; Zi s /vec.Gi s ."; Yi s ; ZMi s ; pi s // @ vec.Zi s /

) (100)

is satisfied where the boundary condition Vi s ."; Yi s ; ZMi s ; Zi s / D i0s ."; Yi s ; ZMi s ; Zi s /. Proof. By what have been shown in the recent results by the first author [6], the detailed development for the result herein can be easily proven. Finally, the following result gives the sufficient condition used to verify a feedback Nash strategy for decision maker i and i D 1; : : : ; N . Theorem 11 (Slow Interactions—Verification Theorem). Let Wi s ."; Yi s ; ZMi s ; Zi s / and i D 1; : : : ; N be continuously differentiable solution of the HJB equation (100) which satisfies the boundary condition Wi s ."; Yi s ; ZMi s ; Zi s / D i0s ."; Yi s ; ZMi s ; Zi s / : f f f Let .tf ; Hi s ; DM i s ; Di s / 2 QO i s ; .Kis ; pis / 2 KO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

(101)

PO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

;

and the corresponding solutions .Hi s ; DM i s ; Di s / of the dynamical equations (93)–(95). Then, Wi s ."; Yi s ; ZMi s ; Zi s / is time-backward increasing function of ˛. If .K ; p / is in KO i s f f f PO i s f f f defined on Œt0 ; tf with the is

is

M i s ;Di s Ii s M i s ;Di s Ii s tf ;Hi s ;D tf ;Hi s ;D M solutions .Hi s ; Di s ; Di s / of the dynamical

corresponding that, for ˛ 2 Œt0 ; tf 0D

equations (93)–(95) such

@ Wi s .˛; His .˛/; DM is .˛/; Dis .˛// @" @ Wi s .˛; His .˛/; DM is .˛/; Dis .˛//vec.Fi s .˛; His .˛/; Kis .˛/// C @ vec.Yi s / C

@ @ vec.ZMi s /

Wi s .˛; His .˛/; DM is .˛/; Dis .˛//vec.GMi s .˛; His .˛/; DM is ;

Kis .˛/; pis .˛/// C

@ Wi s .˛; His .˛/; DM is .˛/; Dis .˛//vec.Gi s .˛; His .˛/; @ vec.Zi s / DM is .˛/; pis .˛///

(102)

Modeling Interactions in Complex Systems

365

then, .Kis ; pis / is a feedback Nash strategy in KO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

PO i s

f

f

f

M i s ;Di s Ii s tf ;Hi s ;D

Wi s ."; Yi s ; ZMi s ; Zi s / D Vi s ."; Yi s ; ZMi s ; Zi s /

,

(103)

where Vi s ."; Yi s ; ZMi s ; Zi s / is the value function associated with decision maker i . Proof. With the aid of the recent development [6], the proof then follows for the verification theorem herein. Regarding the Mayer-type optimization problem herein, it can be solved by applying an adaptation of the Mayer form verification theorem of dynamic programming as f f in (102). Therefore, the terminal time and states ."; Hi s ; DM i s ; Di s / of the dynamics (93)–(95) are now parameterized as ."; Yi s ; ZMi s ; Zi s / for a broader family of optimization problems. To apply properly the dynamic programming approach based on the HJB mechanism, together with the verification result, the solution procedure should be formulated as follows. For any given interior point ."; Yi s ; ZMi s ; Zi s / of the reachable set QO i s and i D 1; : : : ; N , at which the following real-valued function is considered as a candidate solution Wi s ."; Yi s ; ZMi s ; Zi s / to the HJB equation (100). Because the initial state x00 , which is arbitrarily fixed represents both quadratic and linear contributions to the performance index (96) of Mayer type, it hence leads to suspect that the value function is linear and quadratic in x00 . Thus, a candidate function Wi s 2 C 1 .t0 ; tf I R/ for the value function is expected to have the form T Wi s ."; Yi s ; ZMi s ; Zi s / D x00

ki s X

ris .Yi11s;r C Eirs ."//x00

rD1 T C2x00

ki s X rD1

ris .ZMi11s;r C TMi rs ."// C

ki s X

ris .Zi s;r C Ti rs ."//

rD1

(104) where the parametric functions of time Eirs 2 C 1 .t0 ; tf I Rn0 n0 /, TMi rs 2 C 1 .t0 ; tf I Rn0 /, and Ti rs 2 C 1 .t0 ; tf I R/ are yet to be determined. Moreover, it can be shown that the derivative of W."; Yi s ; ZMi s ; Zi s / with respect to time " is kis X d d r T 11 12 21 W ."; Yi s ; ZMi s ; Zi s / D x00 ris Fi11 E ."/ x00 s;r ."; Yi s ; Yi s ; Yi s ; Ki s / C d" d" i s rD1 T C2x00

C

kis X

d ris GMi11s;r ."; Yi11s ; ZMi11s ; Ki s ; pi s C TMirs ."/ d" rD1

kis X

d ris Gi s;r ."; Yi11s ; Yi12s ; Yi21s ; Yi22s ; ZMi11s ; pi s / C Ti rs ."/ : d" rD1 (105)

366

K.D. Pham and M. Pachter

The substitution of this candidate (104) for the value function into the HJB equation (100) and making use of (105) yield ( 0D

min

.Ki s ;pi s /2Ki s P i s T C2x00

C

ki s X rD1

T x00

ki s X

d r 11 12 21 ris Fi11 E ."/ x00 s;r ."; Yi s ; Yi s ; Yi s ; Ki s / C d" i s rD1

ki s X

d ris GMi11s;r ."; Yi11s ; ZMi11s ; Ki s ; pi s C TMi rs ."/ d" rD1

ris

) d Gi s;r ."; Yi11s ; Yi12s ; Yi21s ; Yi22s ; ZMi11s ; pi s / C Ti rs ."/ : d"

(106)

Taking the gradient with respect to Ki s and pi s of the expression within the bracket of (106) yield the necessary conditions for an extremum of risk-value performance index (96) on the time interval Œt0 ; " " Ki s D

Ri1 s

BiTs

ki s X

O ris Yi11s;r

rD1 T pi s D Ri1 s Bi s

ki s X

1 C 1 Qi s ."/ i s

O ris ZMi11s;r :

# (107)

(108)

rD1 r

where the normalized weights O ris , i1s . is Given that the feedback Nash strategy (107) and (108) is applied to the expression (106), the minimum of (106) for any " 2 Œt0 ; tf and when Yi s , ZMi s , and Zi s evaluated along the solutions to the dynamical equations (93)–(95) must be is sought in the next step. As it turns out, the time-dependent functions fEirs ./gkrD1 , k k r i s r i s fTMi s ./grD1, and fTi s ./grD1, which will render the left-hand side of (106) equal to zero, must satisfy the time-backward differential equations, for 1 r ki s d r d d Mr d d r d E ."/ D Hi11s;r ."/I T ."/ D Di s;r ."/ T ."/ D DM i11s;r ."/I d" i s d" d" i s d" d" i s d" (109) whereby the respective Hi11s;r ./, DM i11s;r ./, and Di s;1 ./ are the solutions to: the backward-in-time matrix-valued differential equations d 11 H ."/ D .A0s C Bi s Ki s ."//T Hi11s;1 ."/ Hi11s;1 ."/.A0s C Bi s Ki s ."// d" i s;1 Q0i s KiTs ."/Ri s Ki s ."/ 2Qi s Ki s ."/

(110)

Modeling Interactions in Complex Systems

367

when 2 r ki s d 11 H ."/ D .A0s C Bi s Ki s ."//T Hi11s;r ."/ Hi11s;r ."/.A0s C Bi s Ki s ."// d" i s;r

r1 X vD1

r1 X vD1

11 2rŠ s s Hi s;v ."/˘11 ."/ C Hi12s;v ."/˘21 ."/ Hi11s;rv ."/ vŠ.r v/Š 11 2rŠ s s Hi s;v ."/˘12 ."/ C Hi12s;v ."/˘22 ."/ Hi21s;rv ."/ vŠ.r v/Š (111)

d 12 H ."/ D .A0s C Bi s Ki s ."//T Hi12s;1 ."/ Hi11s;1 ."/.Li s ."/Ci s / d" i s;1 Hi12s;1 ."/.A0s Li s ."/Ci s C Li s ."/Ci s / Q0i s

(112)

when 2 r ki s d 12 H ."/ D .A0s C Bi s Ki s ."//T Hi12s;r ."/ d" i s;r Hi12s;r ."/.A0s Li s ."/Ci s C Li s ."/Ci s / Hi11s;r ."/.Li s ."/Ci s /

r1 X vD1

r1 X vD1

11 2rŠ s s Hi s;v ."/˘11 ."/ C Hi12s;v ."/˘21 ."/ Hi12s;rv ."/ vŠ.r v/Š 11 2rŠ s s ."/ C Hi12s;v ."/˘22 ."/ Hi22s;rv ."/ Hi s;v ."/˘12 vŠ.r v/Š

(113)

d 21 H ."/ D .A0s Li s ."/Ci s C Li s ."/Ci s /T Hi21s;1 ."/ d" i s;1 Hi21s;1 ."/.A0s C Bi s Ki s ."// Q0i s 2Qi s Ki s ."/ .Li s ."/Ci s /T Hi11s;1 ."/

(114)

when 2 r ki s d 21 H ."/ D Hi21s;r ."/.A0s C Bi s Ki s ."// .A0s Li s ."/Ci s d" i s;r CLi s ."/Ci s /T Hi21s;r ."/ .Li s ."/Ci s /T Hi11s;r ."/

r1 X vD1

21 2rŠ s s ."/ C Hi22s;v ."/˘21 ."/ Hi11s;rv ."/ Hi s;v ."/˘11 vŠ.r v/Š

368

K.D. Pham and M. Pachter

r1 X vD1

21 2rŠ s s Hi s;v ."/˘12 ."/ C Hi22s;v ."/˘22 ."/ Hi21s;rv ."/ vŠ.r v/Š (115)

d 22 H ."/ D .Li s ."/Ci s /T Hi12s;1 ."/ .A0s Li s ."/Ci s d" i s;1 CLi s ."/Ci s /T Hi22s;1 ."/ Hi22s;1 ."/.A0s Li s ."/Ci s CLi s ."/Ci s / Hi21s;1 ."/.Li s ."/Ci s / Q0i s

(116)

when 2 r ki s d 22 H ."/ D .Li s ."/Ci s /T Hi12s;r ."/ .A0s Li s ."/Ci s C Li s ."/Ci s /T Hi22s;r ."/ d" i s;r Hi22s;r ."/.A0s Li s ."/Ci s C Li s ."/Ci s / Hi21s;r ."/.Li s ."/Ci s /

r1 X vD1

r1 X vD1

21 2rŠ s s Hi s;v ."/˘11 ."/ C Hi22s;v ."/˘21 ."/ Hi12s;rv ."/ vŠ.r v/Š 21 2rŠ s s Hi s;v ."/˘12 ."/ C Hi22s;v ."/˘22 ."/ Hi22s;rv ."/ vŠ.r v/Š (117)

the backward-in-time vector-valued differential equations d M 11 D ."/ D .A0s C Bi s Ki s ."//T DM i11s;1 ."/ d" i s;1 Hi11s;1 ."/Bi s pi s ."/ KiTs ."/Ri s pi s ."/ Qi s pi s ."/

(118)

when 2 r ki s d M 11 D ."/ D .A0s C Bi s Ki s ."//T DM i11s;r ."/ Hi11s;r ."/Bi s pi s ."/ d" i s;r

(119)

d M 21 D ."/ D .A0s Li s ."/Ci s C Li s ."/Ci s /T DM i21s;1 ."/ .Li s ."/Ci s /T DM i11s;1 ."/ d" i s;1 Hi21s;1 ."/Bi s pi s ."/ Qi s pi s ."/

(120)

when 2 r ki s d M 21 D ."/ D .A0s Li s ."/Ci s C Li s ."/Ci s /T DM i21s;r ."/ .Li s ."/Ci s /T DM i11s;r ."/ d" i s;r Hi21s;r ."/Bi s pi s ."/

(121)

Modeling Interactions in Complex Systems

369

and the backward-in-time scalar-valued differential equations ˚ ˚ 12 d s s Di s;1 ."/ D 2.DM i11s;1 ."//T Bi s pi s ."/ Tr H11 i s;1 ."/˘11 ."/ C Tr Hi s;1 ."/˘21 ."/ d" ˚ ˚ 22 s s T Tr H21 i s;1 ."/˘12 ."/ C Tr Hi s;1 ."/˘22 ."/ pi s ."/Ri s pi s ."/ (122)

when 2 r ki s ˚ ˚ 12 d s s Di s;r ."/ D 2.DM i11s;r ."//T Bi s pi s ."/ Tr H11 i s;r ."/˘11 ."/ C Tr Hi s;r ."/˘21 ."/ d" ˚ ˚ 22 s s Tr H21 (123) i s;r ."/˘12 ."/ C Tr Hi s;r ."/˘22 ."/ :

For the remainder of the development, the requirement for boundary condition (101) yields Eirs .t0 / D 0, TMi rs .t0 / D 0, and Ti rs .t0 / D 0. Finally, the sufficient condition (100) of the verification theorem is hence satisfied so the extremizing feedback Nash strategy (107) and (108) is optimal ki s h i X 1 T Kis ."/ D Ri1 O ris Hi11 s Bi s s;r ."/ C 1 Qi s ."/ i s rD1 T pis ."/ D Ri1 s Bi s

ki s X

O ris DM i11 s;r ."/ :

(124)

(125)

rD1

Therefore, the subsequent result for risk-bearing decisions in slow interactions is summarized for each decision maker, who strategically selects: (a) the worst-case estimation gain Li s in presence of the group interference gain Li s and (b) the feedback Nash decision parameters Kis and pis . Theorem 12 (Slow Interactions—Slow-Timescale Risk-Averse Decisions). Consider slow interactions with the optimization problem governed by the risk-value aware performance index (96) and subject to the dynamical equations (93)–(95). Fix ki s 2 N for i D 1; : : : ; N , and the sequence of nonnegative coefficients is i s D fris 0gkrD1 with 1is > 0. Then, a linear feedback Nash equilibrium for slow interactions minimizing (96) is given by ui s .t/ D Kis .t/xO is .t/ C pis .t/; t , t0 C tf ˛; ˛ 2 Œt0 ; tf # " ki s X 1 r 1 T r 11 Ki s .˛/ D Ri s Bi s O i s Hi s;r .˛/ C 1 Qi s .˛/ ; O ris , i1s i s i s rD1 T pis .˛/ D Ri1 s Bi s

ki s X

O ris DM i11 s;r .˛/;

i D 1; : : : ; N

(126)

(127)

rD1

where all the parametric design freedom through O ris represent the preferences toward specific summary statistical measures; for example, mean variance,

370

K.D. Pham and M. Pachter

skewness, etc. chosen by decision makers for their performance reliability, while M 11 xO is ./, Hi11 s;r ./ and Di s;r ./ are the optimal solutions of the dynamical systems (47) and (110)–(119) when the decision policy ui s and linear feedback Nash equilibrium .Kis ; pis / are applied. Remark 5. It is observed that to have a linear feedback Nash equilibrium Kis ; pis , and i D 1; : : : ; N be defined and continuous for all ˛ 2 Œt0 ; tf , the solutions Hi s .˛/, DM i s .˛/, and Di s .˛/ to the (93)–(95) when evaluated at ˛ D t0 must also exist. Therefore, it is necessary that Hi s .˛/, DM i s .˛/, and Di s .˛/ are finite for all ˛ 2 Œt0 ; tf /. Moreover, the solutions of (93)–(95) exist and are continuously differentiable in a neighborhood of tf . In fact, these solutions can further be extended to the left of tf as long as Hi s .˛/, DM i s .˛/, and Di s .˛/ remain finite. Hence, the existences of unique and continuously differentiable solutions to the (93)–(95) are certain if Hi s .˛/, DM i s .˛/, and Di s .˛/ are bounded for all ˛ 2 Œt0 ; tf /. As the result, the candidate value functions Wi s .˛; Hi s .˛/; DM i s .˛/; Di s .˛// for i D 1; : : : ; N are continuously differentiable as well.

6 Conclusions A complex system is more than the sum of its parts, and the individual decision makers that function as complex dynamical systems can be understood only by analyzing their collective behavior. This research article shows recent advances on distributed information and decision frameworks, including singular perturbation methods for weak and strong coupling approximations in large-scale systems, optimal statistical control decision algorithms for performance reliability, mutual modeling, and minimax estimation for self-coordination, and Nash game-theoretic design protocols for global mission management enabled by local and autonomous decision makers, can be brought to bear on central problems of making assumptions about how to link different levels of dynamical complexity analysis related to the emergence, risk-bearing decisions, and dissolution of hierarchical macrostructures. The emphasis is on the application of a new generation of summary statistical measures associated with the linear-quadratic class of multiperson decision making and control problems in addition of values and risks-based performance indices that can provide a new paradigm for understanding and building distributed systems, where it is assumed that the individual decision makers are autonomous: able to control their own risk-bearing behavior in the furtherance of their own goals.

Appendix: Fast Interactions In Theorem 1, the lack of analysis of performance uncertainty and information around a class of stochastic quadratic decision problems was addressed. The central concern was to examine what means for performance riskiness from the standpoint

Modeling Interactions in Complex Systems

371

of higher-order characteristics pertaining to performance sampling distributions. An effective and accurate capability for forecasting all the higher-order characteristics associated with a finite horizon integral-quadratic performance-measure has been obtained in Theorem 1. For notational simplicity, the right members of the mathematical statistics, which are now considered as the dynamical equations (16)–(20) for the optimal statistical control problem herein, were denoted by the convenient mappings with the actions: 11 Fif;1 .˛; Hif11 .˛/; Hif12 .˛/; Hif21 .˛/; Kif .˛// , .Ai i C Bi i Kif .˛//T Hif11 .˛; 1/

Hif11 .˛; 1/.Ai i C Bi i Kif .˛// Qif KifT .˛/Rif Kif .˛/

(128)

and, for 2 r kif 11 Fif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif21 .˛/; Kif .˛//

, .Ai i C Bi i Kif .˛//T Hif11 .˛; r/ Hif11 .˛; r/.Ai i C Bi i Kif .˛//

r1 X vD1

r1 X vD1

h i 2rŠ f f Hif11 .˛; v/˘11 .˛/ C Hif12 .˛; v/˘21 .˛/ Hif11 .˛; r v/ vŠ.r v/Š h i 2rŠ f f Hif11 .˛; v/˘12 .˛/ C Hif12 .˛; v/˘22 .˛/ Hif21 .˛; r v/ vŠ.r v/Š (129)

12 .˛; Hif11 .˛/; Hif12 .˛/; Hif22 .˛/; Kif .˛// , .Ai i C Bi i Kif .˛//T Hif12 .˛; 1/ Fif;1

Hif11 .˛; 1/.Lif .˛/Ci i / Hif12 .˛; 1/.Ai i Lif .˛/Ci i / Qif

(130)

and, for 2 r kif 12 Fif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif22 .˛/; Kif .˛// , .Ai i C Bi i Kif .˛//T Hif12 .˛; r/

Hif11 .˛; r/.Lif .˛/Ci i / Hif12 .˛; r/.Ai i Lif .˛/Ci i /

r1 X vD1

r1 X vD1

h i 2rŠ f f Hif11 .˛; v/˘11 .˛/ C Hif12 .˛; v/˘21 .˛/ Hif12 .˛; r v/ vŠ.r v/Š h i 2rŠ f f Hif11 .˛; v/˘12 .˛/ C Hif12 .˛; v/˘22 .˛/ Hif22 .˛; r v/ (131) vŠ.r v/Š

21 Fif;1 .˛; Hif11 .˛/; Hif12 .˛/; Hif22 .˛/; Kif .˛// , .Ai i Lif .˛/Ci i /T Hif21 .˛; 1/

372

K.D. Pham and M. Pachter

Hif21 .˛; 1/.Ai i C Bi i Kif .˛// .Lif .˛/Ci i /T Hif11 .˛; 1/ Qif

(132)

and, for 2 r kif 21 Fif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif22 .˛/; Kif .˛// , .Ai i Lif .˛/Ci i /T Hif21 .˛; r/

Hif21 .˛; r/.Ai i C Bi i Kif .˛// .Lif .˛/Ci i /T Hif11 .˛; r/

r1 X vD1

r1 X vD1

h i 2rŠ f f Hif21 .˛; v/˘11 .˛/ C Hif22 .˛; v/˘21 .˛/ Hif11 .˛; r v/ vŠ.r v/Š h i 2rŠ f f Hif21 .˛; v/˘12 .˛/ C Hif22 .˛; v/˘22 .˛/ Hif21 .˛; r v/ (133) vŠ.r v/Š

22 Fif;1 .˛; Hif12 .˛/; Hif21 .˛/; Hif22 .˛// , .Ai i Lif .˛/Ci i /T Hif22 .˛; 1/ Qif

Hif22 .˛; 1/.Ai i Lif .˛/Ci i / .Lif .˛/Ci i /T Hif12 .˛; 1/ Hif21 .˛; 1/.Lif .˛/Ci i / (134) and, for 2 r kif 22 Fif;r .˛; Hif12 .˛/; Hif21 .˛/; Hif22 .˛// , .Ai i Lif .˛/Ci i /T Hif22 .˛; r/

Hif22 .˛; r/.Ai i Lif .˛/Ci i / .Lif .˛/Ci i /T Hif12 .˛; r/ Hif21 .˛; r/.Lif .˛/Ci i /

r1 X vD1

r1 X vD1

h i 2rŠ f f Hif21 .˛; v/˘11 .˛/ C Hif22 .˛; v/˘21 .˛/ Hif12 .˛; r v/ vŠ.r v/Š h i 2rŠ f f Hif21 .˛; v/˘12 .˛/ C Hif22 .˛; v/˘22 .˛/ Hif22 .˛; r v/ vŠ.r v/Š

(135)

n o f Gif;r .˛; Hif11 .˛/; Hif12 .˛/; Hif12 .˛/; Hif22 .˛// , Tr Hif11 .˛; r/˘11 .˛/ o n o n o n f f f Tr Hif12 .˛; r/˘21 .˛/ Tr Hif21 .˛; r/˘12 .˛/ Tr Hif22 .˛; r/˘22 .˛/ ; (136) f

where the Kalman filter gain Lif D Pif CiTi Vi1 i and the shorthand notations ˘11 D f f f f T Lif Vi i Lif , ˘12 D ˘21 D ˘11 , and ˘22 D Gi W GiT C Lif Vi i LTif .

Modeling Interactions in Complex Systems

373

References 1. Saksena, V.R., Cruz, J.B. Jr.: A multimodel approach to stochastic Nash games. Automatica 18(3), 295–305 (1982) 2. Haddad, A.: Linear filtering of singularly perturbed systems. IEEE Trans. Automat. Contr. 21, 515–519 (1976) 3. Khalih, H., Haddad, A., Blankenship, G.: Parameter scaling and well-posedness of stochastic singularly perturbed control systems. Proceedings of Twelfth Asilomar Conference, Pacific Grove, CA (1978) 4. Pham, K.D.: New risk-averse control paradigm for stochastic two-time-scale systems and performance robustness. J. Optim. Theory. Appl. 146(2), 511–537 (2010) 5. Fleming, W.H., Rishel, R.W.: Deterministic and Stochastic Optimal Control. Springer, New York (1975) 6. Pham, K.D.: Performance-reliability-aided decision-making in multiperson quadratic decision games against jamming and estimation confrontations. J. Optim. Theory Appl. 149(1), 599–629 (2011) 7. Yaesh, I., Shaked, U.: Game theory approach to optimal linear state estimation and its relation to the minimum H1 norm estimation. IEEE Trans. Automat. Contr. 37, 828–831 (1992) 8. Jacobson, D.H.: Optimal stochastic linear systems with exponential performance criteria and their relation to deterministic games. IEEE Trans. Automat. Contr. 18, 124–131 (1973) 9. Whittle, P.: Risk Sensitive Optimal Control. Wiley, New York (1990)

Our partners will collect data and use cookies for ad personalization and measurement. Learn how we and our ad partner Google, collect and use data. Agree & close