Next Article in Journal
Ensemble Transductive Propagation Network for Semi-Supervised Few-Shot Learning
Previous Article in Journal
A Mechanistic Model of Perceptual Binding Predicts That Binding Mechanism Is Robust against Noise
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Node-Wise Monotone Barrier Coupling Law for Formation Control

by
Jin Gyu Lee
1,†,
Cyrus Mostajeran
2,* and
Graham Van Goffrier
3
1
Inria, University of Lille, CNRS, UMR 9189—CRIStAL, F-59000 Lille, France
2
School of Physical and Mathematical Sciences, Nanyang Technological University (NTU), Singapore 637371, Singapore
3
Department of Physics and Astronomy, University College London, London WC1E 6BT, UK
*
Author to whom correspondence should be addressed.
This work was done while Jin Gyu Lee was with Seoul National University.
Entropy 2024, 26(2), 134; https://doi.org/10.3390/e26020134
Submission received: 7 January 2024 / Revised: 29 January 2024 / Accepted: 30 January 2024 / Published: 31 January 2024

Abstract

:
We study a node-wise monotone barrier coupling law, motivated by the synaptic coupling of neural central pattern generators. It is illustrated that this coupling imitates the desirable properties of neural central pattern generators. In particular, the coupling law (1) allows us to assign multiple central patterns on the circle and (2) allows for rapid switching between different patterns via simple ‘kicks’. In the end, we achieve full control by partitioning the state space by utilizing a barrier effect and assigning a unique steady-state behavior to each element of the resulting partition. We analyze the global behavior and study the viability of the design.

1. Introduction

The design of individual coupling laws to achieve asymptotic consensus on a common point in a vector space is a well-studied problem [1,2,3]. The analysis relies on convexity. In particular, for the real line, if each agent moves toward a strict inner point of the convex hull of the values of its neighbors, then the minimal (maximal) value among all the agents can only increase (decrease) until they become equal.
For nonlinear spaces, this argument, relying on convexity, cannot be used globally. In particular, for multiple agents on the circle, there is no ‘minimal’ or ‘maximal’. The convexity argument applies only when all agents are initially placed within a semi-circle [2,4]. In this respect, a number of papers have considered the construction of local controllers to achieve (almost) global convergence properties. In particular, modified Kuramoto coupling, Gossip algorithms, and hybrid coupling have been proposed. Meanwhile, to the best of our knowledge, these works either apply to particular interconnection topologies, such as trees and all-to-all interconnection [5,6,7], use auxiliary variables in the embedding space [6,7,8], use global information such as the number of agents N [9], can lead to unnecessarily slow convergence rates [10], or are only analyzed for two agents [11].
Indeed, global convergence properties are hard to achieve in general for the problem of consensus (or formation control) on the circle, unless the control is stochastic. In other words, in general, there are multiple steady-state behaviors or even chaotic ones. From an engineering viewpoint, this issue can be resolved, if we have our control on the multiple central patterns and their associated domain of attraction. For this purpose, we introduce a barrier effect in our coupling, motivated by the neural central pattern generators (CPGs), to partition the state space into finite regions, where for each partition, there exists a unique steady-state behavior.
Neural CPGs produce diverse rhythms in networks for the purpose of collectively generating movements such as breathing, chewing, swallowing, walking, and heart beating [12] in animals. Understanding the mechanisms behind the control and regulation of CPGs may result in technological advances, leading to systems that can rapidly adapt to sudden changes, similar to the way that CPGs adapt in fractions of a second to respond to events, e.g., in choking prevention or predator escape [12]. Besides the ability to accommodate multiple central patterns in the network and rapidly switch between them, such systems also exhibit robustness with respect to individual variability. Indeed, in the study of a network of nonidentical neurons interconnected via excitatory synaptic coupling (a particular type of CPGs), it was shown that the network is robust to heterogeneity and has the emergent behavior (central pattern) of synchronous spiking, even with the weak coupling strength and the impulsive nature of communication [13,14].
Ref. [14] argues that the key feature that provides these attractive properties of CPGs is the fast threshold modulation: a mechanism behind rapid synchronization initially discovered in [15], which can be illustrated by a barrier effect in phase models, as will be discussed in Section 2. Thus, in this paper, we focus on the problem of formation control on the circle and study a node-wise monotone barrier coupling law. In the end, we illustrate that by only assuming the barrier effect, the network exhibits attractive properties of CPGs. In particular:
1.
It allows us to assign multiple central patterns in the steady-state behavior of the network with possibly different formations and common angular frequencies;
2.
It allows rapid switching between different central patterns via a simple ‘kick’ (e.g., an impulsive input) or sudden disturbance.
Moreover, it brings robustness with respect to individual variability. For the considered node-wise coupling law, we then concentrate on the question of the viability of assigning one or multiple central patterns in the network, from an engineering viewpoint.
This paper is organized as follows. In Section 2, we motivate the relevance between coupling functions with a barrier effect in phase models and the synaptic coupling in CPGs. Then, with a brief review of graph theory given in Section 3, we introduce the node-wise monotone barrier coupling law in Section 4, which is the subject of study in this paper. Given the main convergence result in Section 4, we then focus our study on central patterns, where Section 5 and Section 6 consider the analysis and design aspects, respectively. We conclude in Section 7. The proof for the convergence result is given in Appendix B, which uses the graph theoretical lemma introduced in Appendix A.
Notation: R , Z , N , and N 0 denote the set of real numbers, integers, positive integers, and nonnegative integers, respectively. For vectors or matrices a 1 , , a n , col ( a 1 , , a n ) : = [ a 1 T , , a n T ] T . For a set Ƶ , its cardinality is denoted by | Ƶ | . The function sgn : R R denotes the signum function defined as sgn ( s ) = s / | s | for nonzero s, and sgn ( s ) = 0 for s = 0 . In this paper, the modulo operation with respect to 2 π (mod 2 π ) results in a value in [ π , π ) , and the modulo operation with respect to 1 (mod 1) results in a value in [ 0 , 1 ) , for simplicity of notation.

2. Motivation of the Barrier Effect

Fast threshold modulation is a mechanism behind rapid and robust synchronization of nonidentical neuronal spiking systems, e.g., the Fitzhugh–Nagumo model, Morris–Lecar model, and Hodgkin–Huxley model, under weak synaptic coupling. In particular, it provides attractive properties of:
  • rapid convergence to a central pattern;
  • robustness with respect to heterogeneity,
in the following way [14], at the singular limit, i.e., when there is a sufficient time scale separation (illustrated for the central pattern of synchronous spiking):
1.
At the singular limit, the individual system is an oscillator having jumps, which can be described as a hybrid system, that has a jump set of a lower dimension (see (1) and its description for an example).
2.
At the singular limit, this provides a rapid convergence to the neighborhood of the limit cycle given that the coupling is weak.
3.
Then, at the singular limit, the synaptic coupling alters the jump set of an individual in a way that the network-wise jump set demonstrating a central pattern becomes an open set (see (2) and its description for an example).
4.
This open set with nonzero volume is what provides rapid convergence and robustness with respect to heterogeneity.
5.
In particular, by the creation of this open set, the phenomenon of synchronous spiking happens in a hierarchical way: one neuron spikes and this yields a spike of neighboring neurons, and so on to the entire network, at an instant in the singular limit. The mechanism is called fast threshold modulation, as the threshold (jump set) is altered rapidly.
For example, at the singular limit, the neuronal model in [14] can be illustrated by a one-dimensional hybrid system:
x ˙ = h ( x ) R , x > x ̲ , x + = x ¯ + R , x = x ̲ ,
where h ( · ) < 0 dictates the state-dependent velocity of the individual oscillator and x ̲ and x ¯ + are the position of the threshold (jump set) and the jumping point, respectively, such that x ̲ < x ¯ + . It is intuitively clear that this is an oscillator repeating its trajectory from x ¯ + to x ̲ .
What a fast threshold modulation does is that given another system x ^ , it widens a jump set for the synchronous jump from { x ̲ } × { x ̲ ^ } to { x ̲ } × [ x ̲ ^ , x ¯ ^ ) [ x ̲ , x ¯ ) × { x ̲ ^ } with some points x ¯ , x ¯ ^ such that x ̲ < x ¯ < x ¯ + . In particular, at the singular limit, the neuronal network in [14] (with two neurons) can be illustrated by a hybrid system:
x ˙ = h ( x ) , x ^ ˙ = h ^ ( x ^ ) ,   if x > x ̲ , x ^ > x ̲ ^ , col ( x + , x ^ + ) = col ( x ¯ + , x ^ ) , if x = x ̲ , x ^ x ¯ ^ , col ( x , x ¯ ^ + ) , if x x ¯ , x ^ = x ̲ ^ , X + ( x , x ^ ) , if x = x ̲ , x ^ [ x ̲ ^ , x ¯ ^ ) or x [ x ̲ , x ¯ ) , x ^ = x ̲ ^ ,
with an appropriate network-wise jump map X + . Note that by the creation of this open set, even when the neighboring neuron x ^ is not at its jump set (threshold) x ̲ ^ , but only if sufficiently near to it, i.e., x ^ [ x ̲ ^ , x ¯ ^ ) , then the spike of the neuron x modulates the jump set and triggers a spike of the neighboring neuron x ^ . This happens instantly in the singular limit. Therefore, even if the frequencies of individual oscillators are different (heterogeneity), we can obtain a synchronous spiking solution. We emphasize that this creation of an open set can happen even under a weak coupling strength [14]. At the stable positively invariant set inside this new jump set, the convergence rate is independent of the weak coupling strength, and this is what provides rapid convergence. We refer to [14] for a more exhaustive illustration.
Although it is difficult to define a phase for individual systems in such a network, as the range of individual oscillation changes by the action of a neighborhood, if we were to model it in a phase model, then the action of a fast threshold modulation can only be realized by a barrier effect (whether it is discontinuous or continuous), as, in the singular limit, the new open jump set introduces a region [ x ̲ ^ , x ¯ ^ ) , where a phase pulling of infinite power happens by the neuron x at the threshold x ̲ , and clearly demonstrates a boundary x ¯ ^ that discriminates the behavior of neuron x ^ . For instance, if the phase that corresponds to position x ̲ is θ = θ 0 , then as the phase difference θ ^ θ approaches the new threshold θ th , the effect of coupling becomes infinitely strong, where the phase θ th + θ 0 corresponds to position x ¯ ^ .
In the rest of the paper, we will relax this characteristic to an arbitrary coupling law with a barrier effect and consider a network of phase models. It will be shown that this is sufficient to recover the attractive properties of CPGs: rapid convergence and robustness. Moreover, unlike the specific case illustrated in this section only for synchronization, it will be illustrated that this phase network exhibits multiple central patterns, and we can even design them. Before starting this investigation, we briefly review the necessary graph theoretical tools in the next section.

3. Graph Theoretical Preliminaries

A (weighted directed) graph is a pair G = ( N , E ) consisting of a finite nonempty set of nodes N = { 1 , 2 , . . . , N } and an edge set of ordered pairs of nodes E N × N , where ( i , i ) E for all i N (i.e., the graph does not contain self-loops). The set N i = j N j N ( j , i ) E denotes the neighbors of the node i. A tuple ( i 0 , i 1 , . . . , i l ) N l + 1 is called a path (of length l) from the node i 0 to the node i l , if i k N i k + 1 for all k = 0 , , l 1 . If i 1 , , i l are distinct, then the path is called elementary. A loop is an elementary path with i 0 = i l . A strongly connected graph G is a graph for which any pair of distinct nodes j and i are connected via a path in G from j to i.
G is called undirected, if ( j , i ) E implies ( i , j ) E . Given a graph G = ( N , E ) , let N N and:
E E | N : = ( j , i ) E ( j , i ) E i , j N .
The pair G = ( N , E ) is called a subgraph of G . If N = N , then G is a spanning subgraph. If a graph G is connected, then there exists an agent i, called a root of the graph, from which information can propagate to all other agents j along paths in G . A spanning subgraph T of G obtained by removing all edges that do not belong to one of these paths is called a spanning tree of G . Note that any node of the strongly connected graph is a root. Note also that a strongly connected graph is connected, but not vice versa.
An independent strongly connected component (iSCC) of G is an induced subgraph G = ( N , E | N ) , N N , such that it is maximal subject to being strongly connected and satisfies ( j , i ) E for any j N N and i N . For any digraph G , there exists a uniquely defined set of M 1 number of iSCCs. M = 1 if and only if the graph is connected.
The Laplacian matrix L = [ l i j ] R N × N of a graph is defined as L : = D A , where A = [ α i j ] is the adjacency matrix of the graph and D is the diagonal matrix whose diagonal entries are determined such that each row sum of L is zero. By its construction, it contains at least one eigenvalue of zero, whose corresponding eigenvector is 1 N : = [ 1 , , 1 ] R N , and all the other eigenvalues have nonnegative real parts. For directed graphs (digraphs), the zero eigenvalue is simple if and only if the corresponding graph is connected.
We like to stress that for any connected digraph G , the indices can be well assigned so that the Laplacian matrix associated with the graph can be written as:
L = L s 0 A s f L f + D f R N × N ,
where L s R | S | × | S | and L f R ( N | S | ) × ( N | S | ) are the Laplacian matrices of the unique iSCC, S , and the subgraph induced by the rest of the agents, respectively. Since L s is the Laplacian matrix of a strongly connected graph, it is known that there exists a vector ζ : = col ( ζ 1 , , ζ | S | ) R | S | , which satisfies ζ T L s = 0 and ζ i > 0 for all i = 1 , , | S | . In particular, we have col ( ζ , 0 ) T L = 0 .

4. Node-Wise Monotone Barrier Coupling Law

Motivated by Section 2, we consider the node-wise monotone barrier coupling law for a group of N agents evolving on the circle S 1 as:
θ ˙ i = ω i + f i ν i + ϕ i , ν i = j N i α i j ( θ j θ i ) ,
where θ i S 1 represents the phase of agent i, N i is a subset of N whose elements are indices of the agents that send information to agent i (hence, E { ( j , i ) : j N i , i N } ), ω i R is the ‘intrinsic’ frequency, and f i denotes a coupling function on the domain ( π , π ) extended to R 2 π -periodically. α i j > 0 is the interconnection weight and ϕ i [ π , π ) is the phase bias.
Let θ = ( θ 1 , , θ N ) denote an element of the N-torus T N . Note that as the coupling function f i will have a barrier effect, i.e., f i ( s ) ± as s ± π , we want our trajectories to reside inside the set T π N = { θ T N : | ν i + ϕ i | π mod 2 π , i N } T N . Note also that for the network to be well-defined for θ T π N , we should have α i j N ; that is, the network should be quantized, as any addition of 2 π in the phase difference θ j θ i should not alter the coupling input f i ( ν i + ϕ i ) .
We note here that in the rest of the paper, the N-torus T N will be realized by [ π , π ) N , and in that regard, the partition of T π N consisting of a finite number of sets:
Θ { n i } N : = { θ [ π , π ) N | ν i + ϕ i 2 n i π ( π , π ) , i N } ,
where each one associated with a sequence of integers { n i } N Z will take a critical role (as, e.g., in the following theorem) with its associated extension to R N space:
Θ { n i } N R : = { θ R N | ν i + ϕ i 2 n i π ( π , π ) , i N } .
Note that for Θ { n i } N to be nonempty, we should have n i [ d i , d i ] , where 0 d i = j N i α i j Z , and thus, the number of sets is upper bounded by i N ( 2 d i + 1 ) .
Assumption 1. 
The communication graph G is connected; G contains a spanning tree. The adjacency elements α i j , ( j , i ) E are positive integers.
Assumption 2. 
The coupling functions f i : ( π , π ) R , i N are differentiable, strictly monotonically increasing, and have a barrier effect so that f i ( s ) ± as s ± π .
Theorem 1. 
Under Assumptions 1 and 2, for any given { n i } N , each solution trajectory of (3) starting from the extended space Θ { n i } N R uniquely exists and resides inside Θ { n i } N R (hence, forward complete) and converges to a central pattern ( ω ¯ , { Δ i j } E ) of phase-locking behavior determined by:
  • A common frequency ω ¯ R ;
  • A formation { Δ i j } E [ π , π ) : a phase difference given for each edge.
In particular, there exists a steady-state solution of (3) corresponding to ( ω ¯ , { Δ i j } E ) that resides inside Θ { n i } N R . Finally, for each trajectory, the control input f i ( ν i ( t ) + ϕ i ) , i N is bounded uniformly on [ 0 , ) .
Proof. 
We show in Appendix B.1 that the set Θ { n i } N R is positively invariant for the network (3) extended to R N and also that the control input is uniformly bounded. Then, the convergence to a central pattern and the existence of a corresponding steady-state solution that resides inside Θ { n i } N R is shown in Appendix B.2. □
In the following sections, we will further investigate the following:
  • The shape of the central pattern ( ω ¯ , { Δ i j } E ) ;
  • The number of different central patterns N P ;
  • What central patterns can be assigned;
  • How to achieve these central patterns.
Remark 1. 
We neglect the analysis of the convergence rate, as it depends on the slope of our coupling functions f i ( · ) , which can be made arbitrarily large.

5. Analysis of Central Patterns

This subsection corresponds to the analysis part of the study of the considered node-wise monotone barrier coupling law. In particular, for a given set of fixed intrinsic frequencies { ω i } N , a set of coupling functions { f i ( · ) } N , a set of interconnection weights { α i j } E N , and a set of phase biases { ϕ i } N , we first specify the shape of the central pattern ( ω ¯ , { Δ i j } E ) .
Theorem 2. 
Under Assumptions 1 and 2, every trajectory of (3) starting from Θ { n i } N R converges to the unique central pattern ( ω ¯ , { Δ i j } E ) . Here, ω ¯ is the unique solution of:
F ( ω ¯ ) : = i S ζ i f i 1 ( ω ¯ ω i ) + 2 n i π ϕ i = 0 ,
where S denotes the unique iSCC, ζ i > 0 , i S are the components of the left eigenvector of L associated with the zero eigenvalue, and the inverse f i 1 is defined as a mapping from R into ( π , π ) . { Δ i j } E is uniquely defined by the relation Δ i j = Δ j Δ i mod 2 π , where col ( Δ 1 , , Δ N ) Θ { n i } N R is the unique solution of:
L Δ 1 Δ N = f 1 1 ( ω ¯ ω 1 ) + 2 n 1 π ϕ 1 f N 1 ( ω ¯ ω N ) + 2 n N π ϕ N
such that Δ 1 = 0 .
Proof. 
Note first that by Theorem 1, for the given sequence { n i } N , each trajectory starting from Θ { n i } N R has a central pattern ( ω ¯ , { Δ i j } E ) of phase-locking behavior that the trajectory converges to. Being the central pattern, ( ω ¯ , { Δ i j } E ) should satisfy:
ω ¯ = ω i + f i j N i α i j Δ i j + ϕ i , i N .
By Theorem 1, there exists col ( Δ 1 , , Δ N ) Θ { n i } N R such that Δ i j = Δ j Δ i mod 2 π . Without loss of generality, we assume Δ 1 = 0 . This implies:
j N i α i j ( Δ j Δ i ) + ϕ i = f i 1 ( ω ¯ ω i ) + 2 n i π , i N .
Hence, by the following identity:
i S ζ i j N i α i j ( Δ j Δ i ) = 0 ,
we get F ( ω ¯ ) = 0 , where F is defined in (6).
Since the function F : R R is continuous and strictly increasing with respect to ω ¯ , and satisfies lim ω ¯ ± F ( ω ¯ ) = i S ζ i ± π + 2 n i π ϕ i , where:
i S ζ i π < i S ζ i 2 n i π ϕ i < i S ζ i π ,
we have the existence and the uniqueness of the solution ω ¯ of (6). Note that since Θ { n i } N Ø , there exists θ Θ { n i } N such that ν i + ϕ i 2 n i π = : ψ i ( π , π ) , i N ; hence, we get i S ζ i 2 n i π ϕ i = i S ζ i ν i ψ i = i S ζ i ψ i , which implies (10).
Equation (9) further implies (7), and this uniquely defines col ( Δ 1 , , Δ N ) such that Δ 1 = 0 because the Laplacian matrix L has rank N 1 . □
Remark 2. 
Here, we can see the resiliency of the generated patterns with respect to individual variability. In particular, f i 1 ( · ) is a sigmoidal function, and thus, Equation (6) rejects outliers ω i , as done by the median in statistics, which is the solution of the similar equation:
i = 1 N sgn ( ω ¯ ω i ) = 0 .
In general, ω ¯ becomes more tolerant to variation in ω i that is far from ω ¯ . This is also true for the formation, as can be seen in (7). The effect of variation in ω i that is far from ω ¯ ( | f i 1 ( ω ¯ ω i ) | π ) becomes negligible through f i 1 ( · ) due to the barrier effect.
From this characterization of the shape of the central pattern, we have the following conclusion.
Theorem 3. 
Under Assumptions 1 and 2, a network of agents on the circle communicating according to (3) introduces a partition of T π N consisting of N P < number of sets P j T π N , j = 1 , , N P . Every trajectory starting from P j resides inside P j and converges to a unique central pattern ( ω ¯ , { Δ i j } E ) of phase-locking behavior. Each set P j has the following structure:
P j = k = 1 m j Θ { n i k } N .
Proof. 
Given that any initial point of a trajectory in T π N is contained in one of the sets Θ { n i } N Θ { n i } N R , associated with some { n i } N , the convergence to a unique central pattern for any trajectory starting from each set Θ { n i } N R is given by Theorem 2.
Note that for each set Θ { n i } N R , there exists a finite number of sequences { n i k } N , k = 1 , , m such that any point in T π N that corresponds to a set Θ { n i } N R is contained in one of the sets Θ { n i k } N , k = 1 , , m in the partition of T π N . For each unique central pattern, let us collect all the corresponding sets Θ { n i k } N , k = 1 , , m for all positively invariant sets Θ { n i } N R resulting in that particular central pattern, to construct a set P j T π N . Then, each set P j can be represented as a union of a collection of sets Θ { n i k } N , k = 1 , , m j . This is because, otherwise, there exist a sequence { n i } N and θ 1 , θ 2 Θ { n i } N such that θ 1 P j 1 and θ 2 P j 2 with some j 1 j 2 . This yields a contradiction, as trajectories that start from θ 1 and θ 2 reside inside Θ { n i } N R and converge to the same central pattern. □
Now, we specify a collection of sequences { n i k } N , k = 1 , , m j that defines the set P j . For this purpose, we define an equivalence relation for two sequences { n i 1 } N and { n i 2 } N if they have the same central pattern or equivalently that Θ { n i 1 } N and Θ { n i 2 } N are contained in the same set P j , and denote it as { n i 1 } N { n i 2 } N . We also denote the equivalence class as [ { n i 1 } N ] .
Theorem 4. 
Two sequences { n i 1 } N and { n i 2 } N are equivalent, i.e., { n i 1 } N { n i 2 } N , if and only if:
  • i S ζ i n i 1 = i S ζ i n i 2 ;
  • The following equation has a unique integer solution δ ˜ 2 , , δ ˜ N , or equivalently, that the vector on the right-hand side is spanned by the columns of the Laplacian matrix with integer-valued weights:
    L 0 δ ˜ 2 δ ˜ N = n 1 1 n 1 2 n 2 1 n 2 2 n N 1 n N 2
The second condition is equivalent to Δ i 1 = Δ i 2 mod 2 π for all i N , where { Δ i 1 } N and { Δ i 2 } N are the corresponding solutions of (7) for { n i 1 } N and { n i 2 } N , respectively.
Proof. 
The first condition is a necessary and sufficient one for the unique solution of (6) to be equivalent for two sequences { n i 1 } N and { n i 2 } N . This is because, for different i S ζ i n i , we have different ω ¯ , since i S ζ i f i 1 ( ω ¯ ω i ) in (6) is strictly increasing. The second condition is straightforward from (7). In particular, Δ i 1 Δ i 2 = 2 δ ˜ i π for i = 2 , , N . □
Remark 3. 
According to Theorem 4, a strongly connected graph that has the following form of Laplacian matrix ensures that two sequences { n i 1 } N and { n i 2 } N are equivalent if and only if i N ζ i n i 1 = i N ζ i n i 2 :
L = 1 1 1 1
This includes the cases of directed ring graphs and undirected line graphs, which have 1 N as the left eigenvector associated with the zero eigenvalue, resulting in N or N 1 different central patterns (Remark 4).
The number of different central patterns ( ω ¯ , { Δ i j } E ) of the network (3), N P , can be fully characterized by a graph theoretical interpretation as the number of different equivalence classes [ { n i } N ] such that there exists { n i } N [ { n i } N ] , satisfying Θ { n i } N Ø . The following remark and corollary may aid in the analytical investigation to determine N P or at least its upper bound (as in Remark 3). Meanwhile, such a number can be obtained by numerical computation.
Remark 4. 
Unlike the number of different central patterns, N P , which is complicated to find, the number of different i S ζ i n i = : n S is straightforward. In particular, the left eigenvector of L associated with the zero eigenvalue can always be taken as an integer vector where the common denominator of the components is 1. This is because, L 0 I is integer-valued, and thus, Gaussian elimination will produce rational eigenvectors. Then, the number of different n S is simply upper bounded by i S ζ i = : ζ S or ζ S 1 . This is because, we have from ν i + ϕ i 2 n i π ( π , π ) that:
i S ζ i ϕ i 2 n S π ( ζ S π , ζ S π ) ,
and hence, for each ϕ S = i S ζ i ϕ i , we get:
n S ζ S 2 + ϕ S 2 π , ζ S 2 + ϕ S 2 π .
Corollary 1. 
{ n i 1 } N { n i 2 } N if and only if:
  • { n i 1 } S { n i 2 } S for the graph ( S , E | S ) , which is strongly connected;
  • There exist integers δ ˜ i , i N S such that:
    j N i α i j ( δ ˜ j δ ˜ i ) = n i 1 n i 2 , i N S .
In other words, if { n i 1 } S { n i 2 } S , then for any set of integers { δ ˜ i } N S , we have:
{ n i 1 } N [ { n i 2 } N ] ,
where n i 1 = n i 2 + j N i α i j ( δ ˜ j δ ˜ i ) , i N S . In particular, if all the followers ( i N S ) have only one neighbor, | N i | = 1 , and α i j = 1 , j N i , then { n i 1 } N { n i 2 } N if and only if { n i 1 } S { n i 2 } S .
Proof. 
The first claim directly follows from Theorem 4. The second claim follows because under this additional assumption, for any { n i 1 } N S and { n i 2 } N S , there exist integers δ ˜ i , i N S such that:
δ ˜ j δ ˜ i = n i 1 n i 2 , i N S , j N i .
This is because there is no loop in graph ( N S , E | N S ) . Or one can simply consider S as a single node, which makes the entire graph a spanning tree. □
Before concluding this section, we note that, ultimately, by only assuming the barrier effect in our coupling functions, we observe the desirable properties of neural CPGs in the network on the circle:
  • The network exhibits N P number of different central patterns.
  • A simple ‘kick’ (e.g., an impulsive input that instantly shifts the state of the network) that pushes the steady-state solution of P j outside the boundary of P j rapidly switches the central pattern (Remark 1).
  • The number of different central patterns and the steady-state solution are robust to model uncertainties, noises, and disturbances, given that the barrier effect is consistent (Remark 2).
This provides numerous advantages in the problem of formation control on the circle:
  • When considering a single formation in the network on the circle, global convergence is hard to achieve in general (unless the control is stochastic). This is because the required convexity is not retained globally in nonlinear spaces. From an engineering viewpoint, this issue can be resolved, if we have control over the multiple central patterns and their associated domains of attraction. Barrier coupling laws partition the state space into finite regions, where for each partition there exists a unique steady-state behavior.
  • For instance, in a situation where a fleet of drones move in a balanced formation until they encounter obstacles, e.g., a scenario in which they have to pass between two buildings, and this impulsive event is detected by some of the drones in the formation. Then, this event can be made to trigger a ‘kick,’ which could alternate the formation of the network, for example, to a line, so that they can be safely guided through a narrow passage.
To best utilize these advantages, in the next section, we seek the viability of assigning multiple patterns from a practical viewpoint.
Remark 5. 
If we cut the barrier function at a finite region, that is, f ˜ i : ( π , π ) ( M i , M i + ) with some M i < M i + but f ˜ i is still strictly increasing and satisfies lim s ± π f ˜ i ( s ) = M i ± , then since the monotonicity is preserved, the behavior of the network will be either converging to some central pattern and achieving phase-locking behavior or moving to the discontinuous boundary. In particular, if we let ( δ > 0 ):
f ˜ i ( s ) ( M i , M i + δ ) , i f s ( π , s i ) , = f i ( s ) , i f s [ s i , s i + ] , ( M i + δ , M i + ) , i f s ( s i + , π ) ,
where s i , s i + ( π , π ) are such that f i ( s i ) = M i + δ and f i ( s i + ) = M i + δ so that the resulting function is still strictly increasing, then there are no new central patterns generated when δ is sufficiently small. Therefore, for the partition, where the central pattern ( ω ¯ , { Δ i j } E ) corresponding to the coupling functions f i , i N is outside the saturated region, i.e., which has i N such that ω ¯ ω i ( M i , M i + ) , the trajectory starting from that partition moves to the boundary. This becomes clear if we observe the dynamics of x i : = ν i + ϕ i . Then, depending on the vector field on the opposite side, it either moves to another region associated with another sequence { n i } N in a finite time or stays on the boundary. In other words, if we set M i and M i + for each i N such that ω ¯ ω i ( M i , M i + ) for all central patterns ( ω ¯ , { Δ i j } E ) , then the original behavior will be mostly maintained, while some might converge to the boundary and stay there.

6. Design of Central Patterns

This subsection corresponds to the synthesis part of the study of the considered node-wise monotone barrier coupling law. In particular, for a given fixed connected digraph G = ( N , E ) , a set of intrinsic frequencies { ω i } N , and a central pattern ( ω ¯ , { Δ i j } E ) , we seek the viability of assigning the given central pattern to the network (3) under several scenarios that are governed by the choice of freedom we have for the design parameters:
  • A set of interconnection weights { α i j } E N 0 (we allow α i j = 0 for design purposes);
  • A set of phase biases { ϕ i } N ;
  • A set of coupling functions { f i ( · ) } N .
Moreover, among the viable solutions that we can get, we further consider the problem of providing some of the additional desired characteristics, such as:
  • Utilizing a minimal number of edges;
  • Minimizing the number of alternative central patterns;
  • Assigning other given central patterns.
In so doing, we illustrate our findings with examples. We begin with the following theorem on the viability of assigning one central pattern.
Theorem 5. 
1.
It is almost impossible to assign the given central pattern ( ω ¯ , { Δ i j } E ) if we only have the freedom to choose the set of interconnection weights { α i j } E .
2.
If we have freedom of choice for either the set of coupling functions { f i } N or the set of phase biases { ϕ i } N , then we could always assign the given central pattern ( ω ¯ , { Δ i j } E ) .
3.
If our coupling functions are the scaled version of a single fixed function f ¯ , i.e., f i ( · ) = g i f ¯ ( · ) with positive coefficients g i to ensure monotonicity, then we can assign the given central pattern ( ω ¯ , { Δ i j } E ) if and only if:
sgn f ¯ j N i α i j Δ i j + ϕ i = sgn ω ¯ ω i , i N .
Proof. 
The first claim follows from the fact that the following:
f 1 j N 1 α 1 j Δ 1 j + ϕ 1 f N j N N α N j Δ N j + ϕ N
forms only a measure zero set in R N , as it is parametrized by a set of integers { α i j } E and hence, is countable.
The second claim follows from the fact that there always exists { f i } N or { ϕ i } N such that:
f i j N i α i j Δ i j + ϕ i = ω ¯ ω i , i N ,
as f i , i N , are barrier functions. In particular, if we have freedom of choice for the set of coupling functions { f i } N , then we choose any f i such that it satisfies Assumption 2 and f i ( θ i ) = ω ¯ ω i , where θ i = j N i α i j Δ i j + ϕ i . Otherwise, if we have freedom of choice for the set of phase biases { ϕ i } N , then we choose ϕ i [ π , π ) as:
ϕ i = f i 1 ( ω ¯ ω i ) j N i α i j Δ i j mod 2 π .
The final claim also follows from the fact that f i , i N , are barrier functions. In particular, we choose g i as:
g i = ω ¯ ω i f ¯ ( j N i α i j Δ i j + ϕ i ) .
Coupling functions that have a prototypical shape, i.e., f i ( · ) = g i f ¯ ( · ) , are reminiscent of the physiology of CPGs, where the central patterns are designed by the maximal conductances g i of the synaptic coupling g i f ¯ ( · ) [12]. From a practical viewpoint, it reduces the problem of choosing the coupling functions to an algebraic problem.
Proposition 1. 
The necessary and sufficient condition (12) for viability can always be satisfied
  • If we have freedom of choice for the phase biases.
  • If we only have freedom of choice for the interconnection weights, then (12) can be satisfied when:
    -
    ω ¯ ω i ;
    -
    There exists j N i such that Δ i j / ( 2 π ) is an irrational number.
  • If, in addition, our interconnection weights are to take a prototypical ratio, i.e., α i j = β i α ¯ i j with positive integers β i , then (12) can be satisfied when:
    -
    ω ¯ ω i ;
    -
    Δ ¯ i / ( 2 π ) is an irrational number, where Δ ¯ i : = j N i α ¯ i j Δ i j .
Proof. 
The first point is trivial, as, for any given j N i α i j Δ i j , we can always choose ϕ i [ π , π ) so that f ¯ j N i α i j Δ i j + ϕ i becomes positive (or negative).
For the second and the third points, we first prove the following claim.
Claim: Let δ ( 0 , 1 ) be an irrational number. Then, for any ϵ > 0 , there exists n ϵ N such that n ϵ δ < ϵ mod 1 .
Proof of claim: The proof is by contradiction. Suppose that
ϵ : = inf n N n δ mod 1 > 0 .
Then, there exists n N such that:
ϵ 1 n + 1 , 1 n .
By the definition of ϵ , for:
ϵ ˜ : = 1 n ϵ n + 1 > 0 ,
there exists n ˜ ϵ N such that:
ϵ n ˜ ϵ δ < ϵ + ϵ ˜ mod 1 .
If we let:
δ ˜ ϵ : = n ˜ ϵ δ mod 1 .
then this implies that ϵ δ ˜ ϵ < ϵ + ϵ ˜ , and hence:
n δ ˜ ϵ < n ( ϵ + ϵ ˜ ) = 1 ϵ ˜ < 1
and
( n + 1 ) δ ˜ ϵ ( n + 1 ) ϵ 1 .
Since δ is an irrational number, we have ( n + 1 ) δ ˜ ϵ > 1 , and (14) further implies:
0 < ( n + 1 ) δ ˜ ϵ 1 < δ ˜ ϵ ϵ ˜ < ϵ .
In other words, we have
( n + 1 ) n ˜ ϵ δ < ϵ mod 1 ,
which is a contradiction. This completes the proof of the claim. □
For the second point, under this sufficient condition on the existence of j N i , we can simply let α i k = 0 , j k N i and seek for a nonnegative integer α i j such that:
sgn f ¯ α i j Δ i j + ϕ i = sgn ω ¯ ω i .
Such an integer α i j always exists, because Δ i j / ( 2 π ) is an irrational number. In particular, without loss of generality, assume that ω ¯ ω i is positive and let θ ¯ 0 ( π , π ) be such that f ¯ ( θ ¯ 0 ) = 0 . Then, for ϵ : = ( π θ ¯ 0 ) / ( 4 π ) and δ : = Δ i j / ( 2 π ) , our claim ensures the existence of n ϵ N such that n ϵ Δ i j / ( 2 π ) < ( π θ ¯ 0 ) / ( 4 π ) mod 1 . Therefore, if there exists α i j N 0 such that:
α i j Δ i j + ϕ i ( π , θ ¯ 0 ) mod 2 π ,
then this implies that there exists n N such that:
( α i j + n n ϵ ) Δ i j + ϕ i ( θ ¯ 0 , π ) mod 2 π ,
and hence, f ¯ ( ( α i j + n n ϵ ) Δ i j + ϕ i ) also becomes positive.
The third point follows similarly, except that we consider Δ ¯ i instead of Δ i j :
sgn f ¯ β i Δ ¯ i + ϕ i = sgn ω ¯ ω i .
Note that given a formation { Δ i j } E , we can perform an arbitrarily small perturbation so that the above irrational number condition is satisfied, and hence, we can achieve our design goal with arbitrary precision. In particular, in the former case, we can even select an arbitrary edge to ensure that Δ i j / ( 2 π ) is an irrational number. This is because any formation { Δ i j } E can be generated by a sequence of phases { Δ i } N as Δ i j = Δ j Δ i mod 2 π , and thus, with any irrational number δ , if we perturb { Δ i } N as Δ ˜ i = Δ i + ( ϵ · i · δ ) 2 π , i N , then for almost all sufficiently small rational numbers ϵ , Δ i j / ( 2 π ) becomes irrational.
Based on this viability analysis, in the following subsections, we further provide guidelines for achieving the additional desired characteristics, illustrated and further discussed with examples.

6.1. Design Guideline for Utilizing a Minimal Number of Edges

Among all of the possible choices we could take for assigning a central pattern, we provide a design guideline that maximizes the number of interconnection weights that we can set to zero, given a digraph G = ( N , E ) .
If we have freedom of choice for either the set of coupling functions or the set of phase biases, then according to Theorem 5, we can simply choose our interconnection weights so that the reduced subgraph (governed by positive weights) still contains a spanning tree (Assumption 1) and maximizes the number of interconnection weights that are zero. In particular, N 1 edges are sufficient. For the design, one could pick any node from the unique iSCC of the original graph, and then take any spanning tree that connects to it.
On the other hand, if we consider the scaled version of coupling functions as in Theorem 5 and only have freedom of choice for the interconnection weights, then (to assign the given central pattern) we must include at least one edge ( j , i ) for each i N , such that Δ i j / ( 2 π ) is an irrational number (Proposition 1). Thus, for each i N , we need at least one positive interconnection weight α i j . If we denote such a set of at most N edges by E E , then an associated least communication subgraph, which contains E (hence satisfying (12)) and satisfies Assumption 1, can be found as follows.
1.
Consider the reduced graph G S = ( S , E | S ) . Add a minimum number of edges so that the new reduced graph ( S , E S ) contains a spanning tree. This can be completed as follows.
(a)
The reduced graph G S consists of its iSCCs and followers. Consider each iSCC and its followers as a single node (a follower can be included in multiple nodes), and define an edge from one node to another if there is an edge in the original edge set E from any agent inside one node to any agent in the iSCC of another node.
(b)
This new graph is strongly connected. Thus, take any spanning tree of it and add one corresponding edge from the original edge set E .
2.
Then, include all other edges in E , and add a minimum number of edges so that the new subgraph ( N , E N ) contains a spanning tree. This can be completed as follows.
(a)
The graph obtained by including all other edges in E consists of its iSCCs and followers. By construction, there exists unique iSCC included in S .
(b)
Now consider the iSCC included in S and its followers as a single node and consider all other iSCCs each as a single node, and define a graph according to the edge set E .
(c)
Then, this new graph contains a spanning tree which has its root node as the node that corresponds to the iSCC included in S . Take this spanning tree and add one corresponding edge from the original edge set E .
Example 1. 
Let us take an example for the above procedure. For this purpose, let us consider a graph ( N , E ) with N = { 1 , , 8 } and E with ( j , i ) E represented by j i in Figure 1. If the formation { Δ i j } E is governed by Δ i j = Δ j Δ i mod 2 π from { Δ i } N given as:
Δ 1 = 0 , Δ 2 = 1 / 50 , Δ 3 = π / 4 , Δ 4 = π / 2 , Δ 5 = 3 π / 4 , Δ 6 = π + 1 / 100 , Δ 7 = 5 π / 4 + 1 / 100 , Δ 8 = 3 π / 2 , Δ 9 = 7 π / 4 ,
then the set E and the set of edges ( j , i ) E such that Δ i j / ( 2 π ) is an irrational number are obtained as in Figure 1. The procedure described above is illustrated in Figure 1.
Meanwhile, note that as discussed after Proposition 1, we can introduce an infinitesimally small perturbation in the formation to select E as whatever we want. In this sense, we can make the number of positive interconnection weights N 1 or N, by choosing E such that ( N , E ) contains a spanning tree. In particular, we can simply make ( N , E ) to be a spanning tree, if there exists i S such that:
sgn ( f ¯ ( ϕ i ) ) = sgn ( ω ¯ ω i ) ,
or if not, then make ( N , E ) to be a spanning tree with an additional edge ( j , i ) for the root node i. Such an attempt for the situation illustrated in Example 1 can be found in Section 6.3.

6.2. Design Guideline for Minimizing the Number of Alternative Central Patterns

Note that according to Corollary 1, when we choose our nonnegative interconnection weights to be such that the reduced subgraph governed by positive weights is a spanning tree and those positive weights are unity, then our central pattern becomes unique and we have almost global convergence. This is because all of the followers have only one neighbor and α i j = 1 , j N i , hence { n i 1 } N { n i 2 } N if and only if { n i 1 } S { n i 2 } S . Note that S is a singleton { i } , and hence, { n i 1 } S { n i 2 } S if and only if n i 1 = n i 2 . Since ν i 0 , any admissible { n i } N ( Θ { n i } N Ø ) gives n i = 0 ; the number of different central patterns is one.
In this manner, if we have freedom to choose either the set of coupling functions or the set of phase biases, then as in Section 6.1, we can simply choose our interconnection weights so that the reduced subgraph is a spanning tree. Then, no alternative central pattern exists.
On the other hand, if our coupling functions have a prototypical shape as in Theorem 5 and only have freedom of choice for the interconnection weights, then in principle, α i j becomes a large integer, and thus, the number of alternative central patterns becomes large. Meanwhile, if we have a large number of neighbors for each agent, and the formation is uniformly distributed, then we have a better chance of decreasing the number, as there will likely be an edge ( j , i ) such that sgn ( f ¯ ( Δ i j + ϕ i ) ) = sgn ( ω ¯ ω i ) . However, in general, finding a set of interconnection weights that gives a minimal number of alternative central patterns under the restriction of our coupling functions is a hard problem. The best we could do is to reduce the number of neighbors and reduce the interconnection weights, as, in general, the equivalence relation specified in Theorem 4 is complicated, and the fact that α i j is an integer gives an additional restriction via the equality (11) and it is most likely that different { n i } N are not equivalent. This is to reduce the number of admissible { n i } N ( Θ { n i } N Ø ), in particular, its upper bound i N ( 2 d i + 1 ) .
Remark 6. 
According to Remark 5, if we have chosen our interconnection weights, coupling functions, and phase biases, then we can simply cut our coupling functions at a finite region ( M i , M i + ) , to satisfy ω ¯ ω i ( M i , M i + ) , i N only for the desired central pattern. This increases the chance of yielding almost global convergence, even under the restriction f i = g i f ¯ . The trajectory might converge to the boundary and stay, but we can always give a kick to make it converge to the desired central pattern.

6.3. Further Discussions on Example 1

In this subsection, we follow Example 1. However, instead we consider an infinitesimal perturbation on the given formation, so that we can choose the set E of edges ( j , i ) E such that Δ i j / ( 2 π ) is an irrational number, which yields the graph represented in Figure 2, a spanning tree with one additional edge (as discussed at the end of Section 6.1). This is achieved for the formation { Δ ˜ i j } E governed by Δ ˜ i j = Δ ˜ j Δ ˜ i mod 2 π from { Δ ˜ i } N given as:
Δ ˜ 1 = 0 , Δ ˜ 2 = 1 / 50 , Δ ˜ 3 = π / 4 , Δ ˜ 4 = π / 2 , Δ ˜ 5 = 3 π / 4 , Δ ˜ 6 = π + 1 / 50 , Δ ˜ 7 = 5 π / 4 + 1 / 100 , Δ ˜ 8 = 3 π / 2 + 1 / 50 , Δ ˜ 9 = 7 π / 4 + 1 / 100 .
Note that the only difference is Δ ˜ 6 , Δ ˜ 8 , and Δ ˜ 9 , and the difference is smaller than 1 / 50 .
Now consider the situation where our objective central pattern is determined by the above given phases { Δ ˜ i } N and a common frequency ω ¯ = 1 , while given that the intrinsic frequencies are ω 1 = 0 and ω i = 2 for i 1 . Moreover, say our coupling functions are scaled versions of a single function f ¯ ( s ) = tan ( s / 2 ) as in Theorem 5. If additionally, the phase biases { ϕ i } N are fixed as:
ϕ 1 = π 3 / 100 , ϕ 2 = π 3 / 100 , ϕ 3 = 0 , ϕ 4 = π + 1 / 100 , ϕ 5 = 0 , ϕ 6 = π + 1 / 100 , ϕ 7 = π / 2 , ϕ 8 = 0 , ϕ 9 = 0 ,
then to satisfy (12), we should first choose α i j N for each ( j , i ) E , so that:
sgn ( f ¯ ( α i j Δ ˜ i j + ϕ i ) ) = sgn ( ω ¯ ω i ) , i N .
This can be achieved simply by setting α 12 = 1 , α 21 = 2 , and α i j = 1 for all other edges. Then, we choose g i > 0 for each i N so that:
g i f ¯ ( α i j Δ ˜ i j + ϕ i ) = ω ¯ ω i .
The corresponding simulation result with different initial conditions is given in Figure 3. Note that we obtain three different central patterns. This is because only ( n 1 , n 2 ) = ( 1 , 2 ) , ( 0 , 0 ) , ( 0 , 1 ) , ( 0 , 2 ) , ( 1 , 2 ) , ( 1 , 1 ) , ( 1 , 0 ) are possible (Remark 4), and they result in three different equivalence classes [ { 1 , 2 } ] = [ { 0 , 0 } ] = [ { 1 , 2 } ] , [ { 0 , 1 } ] = [ { 1 , 1 } ] , and [ { 0 , 2 } ] = [ { 1 , 0 } ] according to Theorem 4 (their differences are integer span of the column of the Laplacian matrix, ( 1 , 2 ) ) and Corollary 1. This is smaller than the number of different central patterns for the network obtained in Example 1, because the smallest possible α 78 is 1 and α 87 is 4 in Example 1, and the number of different central patterns even with α i j = 1 for all other edges (which makes the inverse of L | N { 7 , 8 } again the integer matrix) is 5.
On the other hand, if we have freedom of choice for the phase biases { ϕ i } N in the above situation, then we can also take α 21 as unity, by taking ϕ 1 = 1 / 25 and ϕ 2 = 1 / 25 , and this gives almost global convergence. The simulation result with the initial condition that resulted in different central patterns in Figure 3 is given in Figure 4a. We observe that now we have convergence to the unique central pattern that we assigned. One can check that the number of different central patterns is 1 in this case. In particular, only ( n 1 , n 2 ) = ( 1 , 1 ) , ( 0 , 0 ) , ( 1 , 1 ) are possible (Remark 4), but they are all in the same equivalence class according to Theorem 4 (their differences are integer spans of the column of the Laplacian matrix, ( 1 , 1 ) ) and Corollary 1.
On the contrary, if we preserve the restriction that the phase biases { ϕ i } N are fixed as (15), but, as discussed in Remark 6, instead saturate the prototypical barrier function so that now f ¯ ( s ) : ( π , π ) ( 200 δ , 40 + δ ) ) with sufficiently small δ > 0 , then we again obtain almost global convergence. The saturation region is chosen so that f ¯ ( α i j Δ ˜ i j + ϕ i ) [ 200 , 40 ] for all i N . Note that, in this case, we must have g 1 = 1 / tan ( π / 2 1 / 40 ) and g 2 = 1 / tan ( π / 2 1 / 200 ) . This is illustrated in Figure 4b with the same initial condition that resulted in a different central pattern in Figure 3. This happens because, for the alternative central patterns, ω ¯ does not satisfy ω ¯ ω i ( g i ( 200 + δ ) , g i ( 40 + δ ) ) , i N , as this is equivalent to ω ¯ ( 1 η 1 , 1 + η 2 ) with some small η 1 , η 2 > 0 , while they have their common frequency bigger than 2 for [ { 0 , 0 } ] and smaller than 0 for [ { 1 , 0 } ] . Therefore, the trajectory starting from that corresponding partition travels to the discontinuous boundary, which in this case, results in a transition to the partition that corresponds to our desired central pattern.

6.4. Assigning Multiple Central Patterns

The following theorem characterizes the viability of assigning multiple central patterns ( ω ¯ k , { Δ i j k } E ) , k = 1 , , n P for a given fixed connected digraph G = ( N , E ) and a set of intrinsic frequencies { ω i } N .
Theorem 6. 
For a set of interconnection weights { α i j } E and a set of phase biases { ϕ i } N , if we have freedom of choice for the set of coupling functions { f i } N , then we could assign the given multiple central patterns ( ω ¯ k , { Δ i j k } E ) , k = 1 , , n P ( n P < N P ) if and only if:
  • Θ i k : = j N i α i j Δ i j k + ϕ i mod 2 π ( π , π ) has the same order as ω ¯ k : if k s is the sorted index such that:
    ω ¯ 1 s ω ¯ 2 s ω ¯ n s P ,
    then we have, with equality being preserved:
    Θ i 1 s Θ i 2 s Θ i n s P , i N .
Hence, if, in addition, we have freedom of choice for the set of phase biases { ϕ i } N , then, it is always possible when n P = 2 .
Proof. 
We can simply choose any f i such that it satisfies Assumption 2 and f i ( θ i k ) = ω ¯ k ω i for all k = 1 , , n P , where θ i k = j N i α i j Δ i j k + ϕ i , k = 1 , , n P . □
Given a digraph G = ( N , E ) , a set of intrinsic frequencies { ω i } N , and multiple desired central patterns ( ω ¯ k , { Δ i j k } E ) , k = 1 , , n P , it might be possible to select a set of interconnection weights { α i j } E so that the above necessary and sufficient condition is fulfilled. However, in such cases, due to the choice of interconnection weights (which in general satisfies α i j > 1 ) the number of alternative central patterns increases (at least the number of { n i } N such that Θ { n i } N Ø ).
Theorem 6 and the corresponding advantages in formation control are illustrated in the following examples.
Example 2. 
For graph G = ( { 1 , 2 } , { ( 1 , 2 ) , ( 2 , 1 ) } ) , if α 12 = 1 and α 21 = 1 , ϕ 1 = π / 2 and ϕ 2 = π / 2 , then we have two different central patterns. If ω 1 = 0 , ω 2 = 2 , ω ¯ = 1 , and Δ 12 = π , then we can set the alternative central pattern to be near the boundary, for instance, as ω ¯ = 2 and Δ 12 = π / 2 ϵ , since Θ 1 = π / 2 , Θ 1 = π ϵ and Θ 2 = π / 2 , Θ 2 = ϵ . A suitable set of coupling functions is as follows:
f 1 ( s ) = tan s 2 + tan π 4 tan π ϵ 2 + tan π 4 + 1 , f 2 ( s ) = tan s 2 + tan π 4 tan ϵ 2 + tan π 4 1 .
Then, since only the alternative central pattern is near the boundary, with a persistent small kick (e.g., a train of impulsive inputs) on θ 1 or θ 2 , we have almost global convergence to the desired central pattern ω ¯ = 1 and Δ 12 = π . This is illustrated in Figure 5.
Example 3. 
Another example is given for the three agents that constitute a directed ring; E = { ( 2 , 1 ) , ( 3 , 2 ) , ( 1 , 3 ) } . From Remark 4, we notice that if ϕ S = π , then the number of different n S is two, and by the structure of the Laplacian matrix, if α i j = 1 , for all ( j , i ) E , then all the sequences associated with each n S are equivalent (Remark 3). Therefore, the number of different central patterns becomes two. We assign for this network a uniformly distributed central pattern with two different permutations by letting:
ω ¯ 1 = 1 , Δ 1 1 = 0 , Δ 2 1 = 2 π 3 , Δ 3 2 = 4 π 3 , ω ¯ 2 = 1 , Δ 1 2 = 0 , Δ 2 2 = 4 π 3 , Δ 3 2 = 2 π 3 .
To satisfy the necessary and sufficient condition in Theorem 6 and to satisfy ϕ S = i = 1 3 ϕ i = π , we utilized:
ϕ 1 = 3 π 4 , ϕ 2 = 3 π 4 , ϕ 3 = π 2 .
Then, for any intrinsic frequency ω i , we can assign both central patterns simultaneously. Here, we take ω 1 = 2 , ω 2 = 0 , and ω 3 = 2 . A suitable set of coupling functions is:
f 1 ( s ) = 2 tan s 2 + tan π 24 tan 7 π 24 + tan π 24 + 1 , f 2 ( s ) = 2 tan s 2 + tan π 24 tan 7 π 24 + tan π 24 1 , f 3 ( s ) = 2 tan s 2 + tan π 12 tan 5 π 12 tan π 12 1 .
This is illustrated in Figure 6.
Example 4. 
Our final example concerns an arbitrary odd number N > 1 with star-shaped graph G = ( { 1 , , N } , { ( 1 , 2 ) , , ( 1 , N ) , ( 2 , 1 ) } ) . If α i j = 1 for all ( j , i ) E , ϕ 1 = ( N 1 ) π / N and ϕ 2 = 0 , then we have two different central patterns. In particular, if ω i = 0 for all i N , ϕ i = 0 , i = 2 , , ( N + 1 ) / 2 and ϕ i = ( N 1 ) π / N , i = ( N + 3 ) / 2 , , N , then we can assign two central patterns (with completely opposite behaviors), where one represents perfect balanced formation, i.e., ω ¯ = 0 , Δ i = 2 ( i 1 ) π / N for all i = 1 , , N , and the other represents perfect synchronization, i.e., ω ¯ = 1 , Δ i = 0 for all i = 1 , , N . This is because 0 = ω ¯ < ω ¯ = 1 and ( N 1 ) π / N = Θ 1 < Θ 1 = ( N 1 ) π / N , 2 ( i 1 ) π / N = Θ i < Θ i = 0 , i = 2 , , ( N + 1 ) / 2 , and ( 2 i N 1 ) π / N = Θ i < Θ i = ( N 1 ) π / N , i = ( N + 3 ) / 2 , , N . We can utilize coupling functions in the form of f i ( s ) = a i tan ( s / 2 ) + b i , where a 1 and b 1 form the unique solution of the linear equation:
tan N 1 2 N π 1 tan N 1 2 N π 1 a 1 b 1 = 0 1 .
For i = 2 , , ( N + 1 ) / 2 , a i and b i form the unique solution of the linear equation:
tan i 1 N π 1 tan 0 1 a i b i = 0 1 .
For i = ( N + 3 ) / 2 , , N , a i and b i form the unique solution of the linear equation:
tan 2 i N 1 2 N π 1 tan N 1 2 N π 1 a i b i = 0 1 .
This is illustrated in Figure 7 for the case when N = 9 .

7. Conclusions

By introducing the node-wise monotone barrier coupling law, we proposed a tool to simultaneously assign multiple central patterns on the circle, where a transition between different patterns can happen via a simple ‘kick’. We characterized the shape of the generated central patterns, identified the number of different central patterns, analyzed the viability of assigning desired patterns, and provided design guidelines.
Compared with our initial work [16], where instead of the node-wise monotone barrier coupling law, we had utilized the edge-wise version:
θ ˙ i = ω i + j N i f i j ( θ j θ i ) , i N ,
we no longer have to confine ourselves to undirected graphs G = ( N , E ) . The analysis of the generated central pattern has become less straightforward, but instead, we obtained a general understanding of the number of different central patterns. From a design perspective, for a similar number of restrictions, we now have fewer limitations and more straightforward design guidelines.
Future consideration will be given to quantitive analysis of the robustness, extension of the framework to other nonlinear spaces, and its use in practical design problems. An example is to control a cluster of drones. Energy perspectives as considered in [16] are also of interest, where a relevant problem for investigation is the minimization of energy to maintain the given formation or the minimization of energy for transitions among multiple desired patterns.

Author Contributions

Conceptualization, C.M. and J.G.L.; Methodology, J.G.L. and C.M.; Software, G.V.G. and J.G.L.; Formal analysis, J.G.L.; Investigation, J.G.L. and C.M.; Writing—original draft, J.G.L.; Writing—review and editing, C.M.; Visualization, G.V.G.; Supervision, C.M. All authors have read and agreed to the published version of the manuscript.

Funding

J.G.L. was supported by the National Research Foundation of Korea grant funded by the Korean government (Ministry of Science and ICT) under No. NRF-2017R1E1A1A03070342. C.M. was supported by a Presidential Postdoctoral Fellowship at NTU and an Early Career Research Fellowship at the University of Cambridge. G.V.G. was supported by the UCL Centre for Doctoral Training in Data Intensive Science funded by STFC, and by an Overseas Research Scholarship from UCL.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

The authors are most grateful to Rodolphe Sepulchre for inspiring this work and for their guidance and support.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Essential Graph Theoretical Lemma

The following lemma is essential in the proof of Theorem 1, which is given in Appendix B.
Lemma A1. 
Under Assumption 1, for any I N such that S I Ø , where S denotes the unique iSCC, there exists ζ i > 0 , i I such that for any vector χ = [ χ i ] R N :
i I ζ i j N α i j ( χ j χ i ) = j N I β j χ j i I γ i χ i
with some coefficients β j , γ i 0 . Moreover, there exists j N I and i I such that β j > 0 and γ i > 0 .
Proof. 
Consider a subgraph G I = ( I , E | I ) . Then, there exists iSCCs denoted as S p I , p M : = { 1 , , M } , and the rest denoted as R I . We will first assume that Lemma A1 holds for the index set R ; that is, ζ i > 0 is given for i R such that for any vector χ = [ χ i ] R N :
i R ζ i j N α i j ( χ j χ i ) = j N I β ¯ j χ j + p = 1 M j S p β ¯ j χ j i R γ i χ i ,
then we will show that for each p M , we can find ζ i > 0 , i S p such that for any vector χ = [ χ i ] R N :
i S p ζ i j N α i j ( χ j χ i ) = j N I β ¯ j p χ j i S p γ ¯ i χ i and γ ¯ i > β ¯ i , i S p .
This will complete the proof. By repeating this argument (i.e., by replacing the role of I with R ), we arrive after finitely many steps at the stage of assuming that Lemma A1 holds for the index set R , but R is empty; that is, the subgraph G I only consists of iSCCs, so that the assumption holds trivially.
Let us carry out the steps of the proof described above. For this purpose, note that by Assumption 1 and the fact that S I Ø , for each p M , there exist j N I and i S p such that ( j , i ) E . This is because otherwise, S p becomes the unique iSCC S of the entire graph, but this is not possible, since S I Ø . Now, let L p denote the Laplacian matrix of the subgraph G p = ( S p , E | S p ) . Then, (A2) for only those corresponding to S p can be represented as:
( ζ p ) T ( L p + D p ) = ( γ ¯ p ) T > ( β ¯ p ) T
with some diagonal matrix D p 0 such that D p 0 by the existence of ( j , i ) E , j N I , i S p . Thus, first let ξ 1 p be the left eigenvector of L p associated with the zero eigenvalue. Then, we have ξ 1 p > 0 and:
( ξ 1 p ) T ( L p + D p ) = ( ξ 1 p ) T D p 0 .
Next, let N 1 S p be the set of all indices i S p such that the element of ( ξ 1 p ) T D p corresponding to agent i is positive. Clearly, N 1 is not empty. Now, we can find sufficiently small ε 1 > 0 such that:
ξ 2 p : = ξ 1 p ε 1 1 N 1 > 0
satisfies:
( ξ 2 p ) T ( L p + D p ) = ε 1 1 N 1 T ( L p + D p ) + ( ξ 1 p ) T D p 0
and that N 1 N 2 , where 1 I denotes the vector of appropriate size with 1 only in the position that corresponds to the index set I and 0 elsewhere. In particular:
N 2 = N 1 i N 1 { j S p | ( j , i ) E } .
Therefore, by repeating this argument, due to the fact that G p is strongly connected, we arrive after finitely many steps at the situation where N k = S p . This implies that:
( ξ k p ) T ( L p + D p ) > 0 .
Therefore, we can find sufficiently large K > 0 such that ζ p : = K ξ k p > 0 satisfies:
( ζ p ) T ( L p + D p ) > ( β ¯ p ) T
and we conclude (A2) as desired. □

Appendix B. Proof of Theorem 1

Appendix B.1. Θ { n i } N R Is Positively Invariant

The existence of a unique (local) solution starting from Θ { n i } N R is simply given by the fact that the system dynamics is locally Lipschitz continuous inside Θ { n i } N R . Now, the rest of the proof is by contradiction. Suppose that there is a particular solution of (3) such that θ Θ { n i } N R holds only for a finite time interval [ 0 , T ) and is violated at t = T . This implies that there is a time sequence { τ k } such that τ k is strictly increasing and lim k τ k = T , and:
I + ( { τ k } ) : = i N : lim k ν i ( τ k ) + ϕ i = ( 2 n i + 1 ) π is nonempty , or I ( { τ k } ) : = i N : lim k ν i ( τ k ) + ϕ i = ( 2 n i 1 ) π is nonempty ,
where n i Z is such that ν i ( 0 ) + ϕ i ( ( 2 n i 1 ) π , ( 2 n i + 1 ) π ) . This implies ν i ( t ) + ϕ i ( ( 2 n i 1 ) π , ( 2 n i + 1 ) π ) for all t [ 0 , T ) . Let us first assume that I + ( { τ k } ) is nonempty. We will first show that a contradiction occurs if S I + ( { τ k } ) , where S denotes the unique iSCC. If S I + ( { τ k } ) Ø , we will then show that it is possible to construct another time sequence { τ ¯ k } (based on { τ k } ), such that:
| I + ( { τ k } ) | < | I + ( { τ ¯ k } ) |
where the notation | · | denotes the cardinality of the set. By repeating this argument (i.e., by replacing the role of { τ k } with { τ ¯ k } ), we arrive after finitely many steps at the index set I + ( { τ k } ) such that S I + ( { τ k } ) , which yields a contradiction. This means that there is no such sequence { τ k } that makes I + ( { τ k } ) nonempty. Similarly, it can be seen that there is no sequence that makes I ( { τ k } ) nonempty. Therefore, we conclude there is no such finite time T, and thus, θ ( t ) Θ { n i } N R for all t 0 .
Let us carry out the steps of the proof described above. For convenience, we write I instead of I + ( { τ k } ) in the following. Note that, by the definition of I , for each η > 0 , there exists a sufficiently large k N such that ν i ( τ k ) + ϕ i > ( 2 n i + 1 ) π η for all k k . Hence, if S I , then for any given set of positive coefficients ζ i , i S , there is k such that:
i S ζ i ν i ( τ k ) = i S ζ i j N α i j · ( θ j ( τ k ) θ i ( τ k ) ) 0 .
This is because, if i S ζ i ( ( 2 n i + 1 ) π ϕ i ) = 0 , then the sum converges to zero, but is negative for all finite k, and otherwise if i S ζ i ( ( 2 n i + 1 ) π ϕ i ) 0 , then there exists sufficiently small η such that the sum is nonzero for all k k . However, this is violated if ζ i , i S corresponds to the elements of the left eigenvector of the Laplacian matrix associated with the zero eigenvalue, because then:
i S ζ i j N α i j ( θ j ( t ) θ i ( t ) ) 0 , t [ 0 , T ) .
Hence, we have shown that S I is not possible and we continue the proof for the case that S I Ø . For this purpose, let:
W ( t ) : = i I ζ i ν i ( t ) = i I ζ i j N α i j · ( θ j ( t ) θ i ( t ) ) ,
where ζ i > 0 , i I is given by Lemma A1 considering the index set I N . Note that W ( t ) is continuously differentiable, W ( t ) < i I ζ i ( ( 2 n i + 1 ) π ϕ i ) = : W ¯ I on [ 0 , T ) , and lim k W ( τ k ) = W ¯ I . Let us now consider a strictly decreasing sequence { ε q } of positive numbers such that lim q ε q = 0 and W ( 0 ) < W ¯ I ε 0 . Choose a subsequence { τ k q } q N of { τ k } such that:
W ( τ k q ) W ¯ I ε q 2 , q N .
Based on this subsequence, we now construct a sequence { s q } q N such that (see Figure A1):
s q : = max s [ 0 , τ k q ] s [ 0 , τ k q ] W ( s ) = W ¯ I ε q .
Figure A1. Illustration of the choice of the sequence { s q } q N based on { τ k } k N .
Figure A1. Illustration of the choice of the sequence { s q } q N based on { τ k } k N .
Entropy 26 00134 g0a1
By (A4) and (A5), the sequence { s q } is strictly increasing and lim q s q = T . Moreover, since lim q W ( s q ) = W ¯ I :
lim q ν i ( s q ) + ϕ i = ( 2 n i + 1 ) π , i I .
In addition, from (A4) and (A5), it follows that s q < τ k q and:
W ˙ ( s q ) 0 , q N .
On the other hand, if we compute W ˙ , then we have:
W ˙ ( t ) = i I ζ i j N α i j ( ω j ω i ) + i I ζ i j N α i j ( f j ( t ) f i ( t ) ) ,
where f k ( t ) : = f k ( ν k ( t ) + ϕ k ) , k N , for simplicity. We denote the first sum by M 0 . Invoking Lemma A1 for the index set I , we, therefore, have that ( β j , γ i 0 ):
W ˙ ( t ) M 0 + j N I β j f j ( t ) i I γ i f i ( t ) .
Let J : = N I (which is nonempty). Then, (A7) and (A8) yield:
j J β j f j ( s q ) i I γ i f i ( s q ) M 0 = : M q .
Again, by Lemma A1, at least one β j ( γ i ), where j J ( i I ), is positive. Thus, it follows from (A6) that M q as q . Since:
j J β j f j ( s q ) β ¯ j J max f j ( s q ) , 0
where β ¯ : = max j J β j > 0 , we have:
j J max f j ( s q ) , 0 M q β ¯ .
Therefore, for each sufficiently large q, there is an index j q J such that f j q ( s q ) M q / ( | J | β ¯ ) . Since J is a finite set, there is a subsequence { τ ¯ k } = { s q k } such that j = j q k J ; hence:
f j ν j ( τ ¯ k ) + ϕ j
that is, ν j ( τ ¯ k ) + ϕ j ( 2 n j + 1 ) π . Consequently:
I + ( { τ k } ) ( A 6 ) I + ( { s q } ) I + ( { τ ¯ k } ) .
By construction, j I + ( { τ ¯ k } ) I + ( { τ k } ) and we can conclude (A3) as desired. Noting that the above proof holds even if we let T = , so that there is no time sequence { τ k } such that τ k is strictly increasing and lim k τ k = which makes I + ( { τ k } ) ( I ( { τ k } ) ) nonempty, it follows that the control input f i ( ν i ( t ) + ϕ i ) is bounded uniformly on [ 0 , T ) = [ 0 , ) .

Appendix B.2. Convergence to a Unique Central Pattern

Given the forward invariance in Θ { n i } N R , the convergence of the trajectory to an integral curve corresponding to a central pattern of phase locking behavior can be shown simply by monotonicity. In particular, the linearization of (3) can be found as:
δ θ ˙ i = f i ( ν i + ϕ i ) j N i α i j ( δ θ j δ θ i ) , i N
and is strictly monotonic with respect to the positive orthant inside the positively invariant set Θ { n i } N R due to Assumptions 1 and 2. The Perron–Frobenius vector of the system on Θ { n i } N R is 1 N as this is the eigenvector of:
diag ( f 1 ( ν 1 + ϕ 1 ) , , f N ( ν N + ϕ N ) ) L
associated with the eigenvalue having the largest real part, which is zero. This ensures that for any trajectory starting from Θ { n i } N R , there exists a central pattern ( ω ¯ , { Δ i j } E ) such that the trajectory converges to a trajectory of form col ( ω ¯ t + ψ 1 , , ω ¯ t + ψ N ) , where:
ψ j ψ i = Δ i j mod 2 π .
Such a trajectory actually exists in Θ { n i } N R as the control input f i ( ν i ( t ) + ϕ i ) is bounded uniformly on [ 0 , ) (Appendix B). Further details may be found in [16,17,18].

References

  1. Moreau, L. Stability of continuous-time distributed consensus algorithms. In Proceedings of the 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601), Nassau, Bahamas, 14–17 December 2004; Volume 4, pp. 3998–4003. [Google Scholar] [CrossRef]
  2. Moreau, L. Stability of multiagent systems with time-dependent communication links. IEEE Trans. Autom. Control 2005, 50, 169–182. [Google Scholar] [CrossRef]
  3. Olfati-Saber, R.; Fax, J.A.; Murray, R.M. Consensus and Cooperation in Networked Multi-Agent Systems. Proc. IEEE 2007, 95, 215–233. [Google Scholar] [CrossRef]
  4. Jadbabaie, A.; Lin, J.; Morse, A. Coordination of groups of mobile autonomous agents using nearest neighbor rules. IEEE Trans. Autom. Control 2003, 48, 988–1001. [Google Scholar] [CrossRef]
  5. Sepulchre, R.; Paley, D.A.; Leonard, N.E. Stabilization of Planar Collective Motion: All-to-All Communication. IEEE Trans. Autom. Control 2007, 52, 811–824. [Google Scholar] [CrossRef]
  6. Scardovi, L.; Sarlette, A.; Sepulchre, R. Synchronization and balancing on the N-torus. Syst. Control Lett. 2007, 56, 335–341. [Google Scholar] [CrossRef]
  7. Sarlette, A.; Sepulchre, R. Consensus Optimization on Manifolds. SIAM J. Control Optim. 2009, 48, 56–76. [Google Scholar] [CrossRef]
  8. Sepulchre, R.; Paley, D.A.; Leonard, N.E. Stabilization of Planar Collective Motion with Limited Communication. IEEE Trans. Autom. Control 2008, 53, 706–719. [Google Scholar] [CrossRef]
  9. Sarlette, A.; Sepulchre, R. Synchronization on the circle. In The Complexity of Dynamical Systems: A Multi-Disciplinary Perspective; Dubbeldam, J., Green, K., Lenstra, D., Eds.; Wiley: Hoboken, NJ, USA, 2011. [Google Scholar]
  10. Sarlette, A.; Tuna, S.E.; Blondel, V.D.; Sepulchre, R. Global synchronization on the circle. IFAC Proc. Vol. 2008, 41, 9045–9050. [Google Scholar] [CrossRef]
  11. Bertollo, R.; Panteley, E.; Postoyan, R.; Zaccarian, L. Uniform global asymptotic synchronization of Kuramoto oscillators via hybrid coupling. IFAC-PapersOnLine 2020, 53, 5819–5824. [Google Scholar] [CrossRef]
  12. Drion, G.; Franci, A.; Sepulchre, R. Cellular switches orchestrate rhythmic circuits. Biol. Cybern. 2019, 113, 71–82. [Google Scholar] [CrossRef] [PubMed]
  13. Lee, J.G.; Sepulchre, R. Rapid synchronization under weak synaptic coupling. In Proceedings of the 2020 59th IEEE Conference on Decision and Control (CDC), Jeju, Republic of Korea, 14–18 December 2020; pp. 6168–6173. [Google Scholar] [CrossRef]
  14. Lee, J.G.; Sepulchre, R.J. Rapid and robust synchronization via weak synaptic coupling. Automatica 2024, 160, 111416. [Google Scholar] [CrossRef]
  15. Somers, D.; Kopell, N. Rapid synchronization through fast threshold modulation. Biol. Cybern. 1993, 68, 393–407. [Google Scholar] [CrossRef] [PubMed]
  16. Mostajeran, C.; Lee, J.G.; Van Goffrier, G.; Sepulchre, R. Target formation on the circle by monotone system design. In Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), Austin, TX, USA, 14–17 December 2021; pp. 7106–7111. [Google Scholar] [CrossRef]
  17. Forni, F.; Sepulchre, R. Differentially Positive Systems. IEEE Trans. Autom. Control 2016, 61, 346–359. [Google Scholar] [CrossRef]
  18. Mostajeran, C.; Sepulchre, R. Positivity, Monotonicity, and Consensus on Lie Groups. SIAM J. Control Optim. 2018, 56, 2436–2461. [Google Scholar] [CrossRef]
Figure 1. Illustration of the graphs ( N , E ) and ( N , E ) , and the process (1) and (2) in obtaining the least communication subgraph in Example 1.
Figure 1. Illustration of the graphs ( N , E ) and ( N , E ) , and the process (1) and (2) in obtaining the least communication subgraph in Example 1.
Entropy 26 00134 g001
Figure 2. Illustration of the graphs ( N , E ) and ( N , E ) in Section 6.3.
Figure 2. Illustration of the graphs ( N , E ) and ( N , E ) in Section 6.3.
Entropy 26 00134 g002
Figure 3. Simulation results for initial conditions (1) θ 1 ( 0 ) = π (2) θ 1 ( 0 ) = 0 (3) θ 1 ( 0 ) = π / 2 , where θ i ( 0 ) = 0 , i 1 for all cases. These correspond to the equivalence classes (1) [ { 0 , 1 } ] (2) [ { 0 , 0 } ] (3) [ { 1 , 0 } ] . The equivalence class [ { 0 , 1 } ] corresponds to the objective formation. The graph represents the phase differences θ i ( t ) θ 1 ( t ) , i 1 .
Figure 3. Simulation results for initial conditions (1) θ 1 ( 0 ) = π (2) θ 1 ( 0 ) = 0 (3) θ 1 ( 0 ) = π / 2 , where θ i ( 0 ) = 0 , i 1 for all cases. These correspond to the equivalence classes (1) [ { 0 , 1 } ] (2) [ { 0 , 0 } ] (3) [ { 1 , 0 } ] . The equivalence class [ { 0 , 1 } ] corresponds to the objective formation. The graph represents the phase differences θ i ( t ) θ 1 ( t ) , i 1 .
Entropy 26 00134 g003
Figure 4. Simulation results for initial conditions (1) θ 1 ( 0 ) = π (2) θ 1 ( 0 ) = 0 (3) θ 1 ( 0 ) = π / 2 , where θ i ( 0 ) = 0 , i 1 for all cases, when (a) we allow the freedom of choice on the phase biases and (b) we saturate the prototypical barrier function. The graph represents the phase differences θ i ( t ) θ 1 ( t ) , i 1 .
Figure 4. Simulation results for initial conditions (1) θ 1 ( 0 ) = π (2) θ 1 ( 0 ) = 0 (3) θ 1 ( 0 ) = π / 2 , where θ i ( 0 ) = 0 , i 1 for all cases, when (a) we allow the freedom of choice on the phase biases and (b) we saturate the prototypical barrier function. The graph represents the phase differences θ i ( t ) θ 1 ( t ) , i 1 .
Entropy 26 00134 g004
Figure 5. Simulation results for initial conditions (1) θ 1 ( 0 ) = 0 , θ 2 ( 0 ) = 0 and (2) θ 1 ( 0 ) = 3 π / 4 , θ 2 ( 0 ) = 0 , when (a) there are no ‘kicks’ and (b) there is a small persistent excitation given to θ 2 , which ‘kicks’ the trajectory from the near-boundary central pattern (1) to the robust central pattern (2). These correspond to the equivalence classes (1) [ { 0 , 0 } ] and (2) [ { 0 , 1 } ] .
Figure 5. Simulation results for initial conditions (1) θ 1 ( 0 ) = 0 , θ 2 ( 0 ) = 0 and (2) θ 1 ( 0 ) = 3 π / 4 , θ 2 ( 0 ) = 0 , when (a) there are no ‘kicks’ and (b) there is a small persistent excitation given to θ 2 , which ‘kicks’ the trajectory from the near-boundary central pattern (1) to the robust central pattern (2). These correspond to the equivalence classes (1) [ { 0 , 0 } ] and (2) [ { 0 , 1 } ] .
Entropy 26 00134 g005
Figure 6. Simulation results for initial conditions (1) θ i ( 0 ) = 0 , i N and (2) θ 1 ( 0 ) = 0 , θ 2 ( 0 ) = 0 , θ 3 ( 0 ) = π / 3 . These correspond to the equivalence classes (1) [ { 0 , 0 , 0 } ] and (2) [ { 0 , 1 , 0 } ] .
Figure 6. Simulation results for initial conditions (1) θ i ( 0 ) = 0 , i N and (2) θ 1 ( 0 ) = 0 , θ 2 ( 0 ) = 0 , θ 3 ( 0 ) = π / 3 . These correspond to the equivalence classes (1) [ { 0 , 0 , 0 } ] and (2) [ { 0 , 1 , 0 } ] .
Entropy 26 00134 g006
Figure 7. Simulation results for initial conditions (1) θ 2 ( 0 ) = 0 and θ i ( 0 ) = 2 ( i 1 ) π / N , i 2 and (2) θ 2 ( 0 ) = 2 π / N and θ i ( 0 ) = 0 , i 2 .
Figure 7. Simulation results for initial conditions (1) θ 2 ( 0 ) = 0 and θ i ( 0 ) = 2 ( i 1 ) π / N , i 2 and (2) θ 2 ( 0 ) = 2 π / N and θ i ( 0 ) = 0 , i 2 .
Entropy 26 00134 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lee, J.G.; Mostajeran, C.; Goffrier, G.V. Node-Wise Monotone Barrier Coupling Law for Formation Control. Entropy 2024, 26, 134. https://doi.org/10.3390/e26020134

AMA Style

Lee JG, Mostajeran C, Goffrier GV. Node-Wise Monotone Barrier Coupling Law for Formation Control. Entropy. 2024; 26(2):134. https://doi.org/10.3390/e26020134

Chicago/Turabian Style

Lee, Jin Gyu, Cyrus Mostajeran, and Graham Van Goffrier. 2024. "Node-Wise Monotone Barrier Coupling Law for Formation Control" Entropy 26, no. 2: 134. https://doi.org/10.3390/e26020134

APA Style

Lee, J. G., Mostajeran, C., & Goffrier, G. V. (2024). Node-Wise Monotone Barrier Coupling Law for Formation Control. Entropy, 26(2), 134. https://doi.org/10.3390/e26020134

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop