Abstract
The control of complex networks is of paramount importance in areas as diverse as ecosystem management, emergency response and cell reprogramming. A fundamental property of networks is that perturbations to one node can affect other nodes, potentially causing the entire system to change behaviour or fail. Here we show that it is possible to exploit the same principle to control network behaviour. Our approach accounts for the nonlinear dynamics inherent to real systems, and allows bringing the system to a desired target state even when this state is not directly accessible due to constraints that limit the allowed interventions. Applications show that this framework permits reprogramming a network to a desired task, as well as rescuing networks from the brink of failure—which we illustrate through the mitigation of cascading failures in a power-grid network and the identification of potential drug targets in a signalling network of human cancer.
Similar content being viewed by others
Introduction
Complex systems such as power grids, cellular networks and food webs are often modelled as networks of dynamical units. In such complex networks, a certain incidence of perturbations and the consequent impairment of the function of individual units—whether power stations, genes or species—are largely unavoidable in realistic situations. While local perturbations may only rarely disrupt a complex system, they can propagate through the network as the system accommodates to a new equilibrium. This in turn often leads to system-wide reconfigurations that can manifest themselves as genetic diseases1,2, power outages3,4, extinction cascades5,6, traffic congestions7,8 and other forms of large-scale failures9,10.
A fundamental characteristic of most large complex networks, both natural and man-made, is that they operate in a decentralized way. On the other hand, such networks have generally either evolved or been engineered to inhabit stable states in which they perform their functions efficiently. The existence of stable states indicates that arbitrary initial conditions converge to a relatively small number of persistent states, which are generally not unique and can change in the presence of large perturbations. Because complex networks are decentralized, upon perturbation the system can spontaneously go to a state that is less efficient than others available. For example, a damaged power-grid undergoing a large blackout may still have other stable states in which no blackout would occur, but the perturbed system may not be able to reach those states spontaneously. We suggest that many large-scale failures are determined by the convergence of the network to a ‘bad’ state rather than by the unavailability of ‘good’ states.
Here we explore the hypothesis that one can design physically admissible compensatory perturbations that can be used to direct a network to a desirable state even when it would spontaneously go to an undesirable (‘bad’) state. An important precedent comes from the study of metabolic networks of single-cell organisms, where perturbations caused by genetic or epigenetic defects can lead to non-viable strains. The knockdown or knockout of specific genes has been predicted to mitigate the consequences of such defects and often recover the ability of the strains to grow11. Another precedent comes from the study of food-web networks, where perturbations caused by human or natural forces can lead to the subsequent extinction of multiple species. Recent research predicts that a significant fraction of these extinctions can be prevented by the targeted suppression of specific species in the system12. These findings have analogues in power grids, where perturbations caused by equipment malfunction/damage or operational errors can lead to large blackouts, but appropriate shedding of power can substantially reduce subsequent failures13,14. Therefore, the concept underlying our hypothesis is supported by recent research on physical15,16, biological11,17 and ecological networks12. The question we pose is whether compensatory perturbations can be systematically identified for a general network of dynamical units.
Results
Control strategy for networks
Our solution to this problem is based on the insight that associated with each desirable state there is a region of initial conditions whose trajectories converge to it—the so-called ‘basin of attraction’ of that state. Given a network that is at (or will approach) an undesirable state, the conceptual problem is thus equivalent to identifying a perturbation to the state of the system that can bring it to the attraction basin of the desired stable state (the target state). Once there, the system will evolve spontaneously to the target. However, such perturbations must be physically admissible and are, therefore, subject to constraints—in the examples above, certain genes can be downregulated but not overexpressed, the populations of certain species can only be reduced, and changes in power flow are limited by capacity and the ability to modify the physical state of the components. Under such constraints, the identification of a point within the target’s basin of attraction is a highly non-trivial task.
Figure 1a–c illustrates the problem that we intend to address. The dynamics of a network is best studied in the state space, where we can follow the time evolution of individual trajectories and characterize the stable states of the whole system. Figure 1a represents a network that would spontaneously go to an undesirable state, possibly due to an external perturbation, and that we would like to bring to a desired stable state by intentionally perturbing at most three of its nodes (highlighted). Figure 1b shows how this perturbation, changing the state of the system from x0 to , would lead to an orbit that asymptotically goes to the target state. As an additional constraint, suppose that the activity of the nodes is non-negative and can only be reduced (not increased) by this perturbation. Then, in the subspace corresponding to the nodes that can be perturbed, the set of points S that can be reached by eligible perturbations forms a cubic region, as shown in Fig. 1c. The target state itself is outside this region (and, in fact, assumed to be outside the subspace of the three accessible nodes), meaning that it cannot be directly reached by any eligible perturbation. However, its basin of attraction may have points inside the region of eligible perturbations (Fig. 1c), in which case the target state can be reached by bringing the system to one of these points; once there, the system will spontaneously evolve towards the target state. This scenario leads to a very clear conclusion: a compensatory perturbation exists if and only if the region formed by eligible perturbations overlaps with the basin of attraction of the target.
However, there is no general method to identify basins of attraction (or this possible overlap) in the high-dimensional state spaces typical of complex networks (even though the desired stable states themselves are usually straightforward to identify). Despite significant advances, existing numerical techniques are computationally prohibitive and analytical methods, such as those based on Lyapunov stability theorems, offer only rather conservative estimates and are not yet sufficiently developed to be used in this context18,19,20. Accordingly, our approach does not assume any information about the location of the attraction basins and addresses a problem that cannot be solved by existing methods from control theory, optimization or network theory (Supplementary Discussion).
Systematic identification of compensatory perturbations
The dynamics of a complex network can often be represented by a set of coupled ordinary differential equations. We thus consider an N-node network whose n-dimensional dynamical state x is governed by
We focus on models of this form because of their widespread use and availability in modelling real complex networks. However, with minor modification, the approach we develop remains effective in situations that, due to stochasticity and/or parameter uncertainty, depart from idealized deterministic models (Supplementary Discussion, Supplementary Figs S1–S3).
The example scenario we envision is the one in which the network has been perturbed at a time before t0, bringing it to a state x0=x(t0) in the attraction basin Ω(xu) of an undesirable state xu. We seek to identify a judiciously chosen perturbation x0→ to be implemented at time t0 so that belongs to the basin of attraction Ω(x*) of a desired state x*. For simplicity, we assume that xu and x* are fixed points, although the approach we develop extends to other types of attractors. In the absence of any constraints, it is always possible to perturb x0 such that ≡ x*. However, as discussed above, usually only constrained compensatory perturbations are allowed in real networks. These constraints encode practical considerations and often take the form of mandating no modification to certain nodes, while limiting the extent and direction of the changes in others. The latter is a consequence of the relative ease of removing versus adding resources to real systems. We thus assume that the constraints on the eligible perturbations can be represented by vector expressions of the form
where the equality and inequality are interpreted to apply component-wise. We propose to construct compensatory perturbations iteratively from small perturbations, as shown in Fig. 1d. Given a dynamical system in the form (1) and an initial state x0 at time t0, a small perturbation δ x0 evolves in time according to δ x(t)=M(x0, t)·δ x0. The matrix M(x0, t) is the solution of the variational equation dM/dt=D F(x)·M subject to the initial condition M(x0, t0)=1. We can use this transformation to determine the perturbation δ x0 to the initial condition x0 (at time t0) that, among the admissible perturbations, will render x(tc)+δ x(tc) closest to x* (Fig. 1d), where tc is the time of closest approach to the target along the orbit. Large perturbations can then be built up by iterating the process: every time δ x0 is calculated, the current initial state, , is updated to +δ x0, and a new δ x0 is calculated starting from the new initial state (Fig. 1e). A visualization of this iterative procedure in two dimensions can be found in the Supplementary Information (Supplementary Discussion, Supplementary Fig. S4, Supplementary Movie). Before proceeding, we stress that the compensatory perturbation—the only intervention to be actually implemented in the network—is defined by the sum of all δ x0.
After each iteration, we test whether the new state reaches the target (Methods). If so, a compensatory perturbation has been found and is given by −x0. Now, it may be the case that no compensatory perturbation can be found, for example, if the feasible region S does not intersect the target basin Ω(x*). To account for this, we automatically terminate our search if the system is not controlled within a sufficiently large number of iterations (Methods). We have, however, benchmarked our approach using randomly generated networks in which compensatory perturbations are known to exist under the given constraints (Supplementary Discussion). Our method succeeds in identifying them in 100% of cases, thus providing confidence that the approach introduced here can indeed be used to control a network when it is theoretically possible to do so. We note that our approach is effective even when it has to cross multiple attraction basins (Supplementary Fig. S4b) and when the basin boundaries are complex (Supplementary Discussion, Supplementary Figs S5 and S6).
The above benchmark also confirms the efficiency of our algorithm (Supplementary Figs S7 and S8), for which the theoretical running time is O(n2.5), where n is the number of dynamical variables in the network (Supplementary Discussion). Computationally, this is not onerous, especially since the control of a network requires the identification of only one compensatory perturbation. This should be contrasted with the time that would be required to determine the basin of attraction at fixed resolution by direct sampling of the state space.
Application to the identification of therapeutic interventions
We apply our approach to the identification of potential therapeutic targets in a form of human blood cancer (large granular lymphocytic leukaemia) caused by the abnormal survival of certain white blood cells (cytotoxic T cells). These T cells are part of the immune system and are produced to attack infected or dysfunctional cells. Under normal conditions, once the compromised cells have been removed, a significant portion of the T cells undergo programmed cell death (apoptosis). The disease, T-LGL leukaemia, results precisely from the failure of T cells to undergo apoptosis, and the consequent negative impact they have on normal cells of the body21. The identification of potential therapeutic interventions is important as, at present, there is no curative treatment for this disease.
To formulate the problem, we use the 60-node survival signalling network model of T cells reconstructed and validated in Zhang et al.22, where nodes correspond to proteins, transcripts, inputs (for example, external stimuli), and cellular concepts (for example, apoptosis). The state of each node is represented by a continuous variable between 0 and 1 (Methods). According to this model, normal and cancer states correspond to two different types of stable steady states. Potential curative interventions are those that can bring the system from a cancerous or precancerous state (those in the attraction basin of a cancer state) to the attraction basin of the normal state, which leads to apoptosis. Previous experimental and computational studies have identified 19 nodes in this network as promising targets for curative interventions based on single, permanent reversals of the corresponding (binary) gene or protein activity in the cancer state23. The question we pose is whether novel interventions exist among the remaining nodes in the network (potentially involving multiple nodes), and furthermore, whether they can be effective with only the temporary, one-time perturbations considered here. Figure 2 shows the 19 previously characterized targets (grey), 10 nodes representing static inputs (blue) or concepts (green), and the remaining 31 nodes (yellow–red) that we use to search for novel interventions.
We first allowed all of these 31 accessible nodes to be perturbed, under the constraints that their state variables are kept within 0 and 1, and that the other nodes are not perturbed. Because it is important to consider intermediary cell states that lead to the cancer state, we sought to identify compensatory perturbations for 10,000 such states selected from a uniform sampling of the state space. Of these, 67% are successfully rescued using our approach. As shown in Fig. 3, a number of striking patterns emerge in the interventions we found. Most nodes are consistently suppressed, which may in part be attributed to the fact that all nodes other than Apoptosis are inactive in the target state, but this is also true for nodes that are inactive in the cancer state. In addition, there are several nodes whose activity is consistently enhanced, despite the fact that they are active in the cancer state. These counterintuitive interventions are unlikely to be identified by simple inspection of the network or its stable states.
We can reduce the number of nodes that are perturbed by taking advantage of the reasonable expectation that the nodes that have been perturbed by the largest amount should dominate the membership of the smallest successful control sets (Fig. 2). Specifically, we find that we can rescue the same precancerous states above with an average (standard deviation) of only 3.4 (3.7) nodes. These interventions involve a small number of genes but at the same time are multi-target, which is desirable given that the cure for currently incurable diseases is believed to reside in the coordinated modulation of multiple cellular components24. Such interventions are prohibitively difficult to identify experimentally by exhaustive search in the absence of computational predictions such as ours. Moreover, there is a high degree of overlap between these reduced control sets (Fig. 2), with nodes GZMB and FasT participating in nearly half of them. These nodes, and other frequently occurring nodes such as IAP and Fas, are attractive candidates for experimental verification. Some of these genes work in tandem, with control sets formed by FasT and Fas alone predicted to rescue over 13% of all cases. Our analysis suggests that interventions can be effective even if they are temporary, which, because they can be more easily implemented pharmacologically, are preferable to potential therapies based on permanent changes to a node state.
Reprogramming in associative memory networks
In an associative memory network, each memorized pattern is encoded as an attractor. An important problem in this context concerns the identification of constrained perturbations that cause the network to transition from a given pattern to a different specific pattern. To illustrate this problem, we consider a model of associative memory consisting of N identical coupled oscillators25,
where θi is the phase variable of oscillator i, Cij are the elements of the interaction matrix, and is the strength of the second-order coupling term. Up to translation of all oscillators by a constant phase, system (3) has 2N fixed points, corresponding to the phase-locked solutions in which |θj−θi|=0 or |θj−θi|=π for every i and j. The attractors in this system consist of all such fixed points that are stable25. This way, each asymptotic state of the network is identified uniquely with a binary pattern. In order to preferentially stabilize the desired states, the network is wired according to Hebb's learning rule , where with (i=1,...,N, μ=1,...,p) is the set of p binary input patterns of length N to be stored26. As an example, we consider a network of size N=64, for ε=0.8, storing p=7 patterns that represent the letters of the word ‘NETWORK’. The resulting network is depicted in Fig. 4a.
We seek to identify perturbations that induce transitions between the memorized patterns while only changing oscillators representing ‘off’ pixels, thereby requiring the existing pattern to be preserved. Figure 4b shows the results for initial/target state pairs corresponding to consecutive letters of ‘NETWORK’. In every case, the constraints on the eligible perturbations forbid reaching the target state directly. Nonetheless, in every case, the control procedure succeeds in identifying a perturbed initial state (bottom row) that spontaneously evolves to the target or to a similar pattern with a small number of binary errors (grey)—and which is expected to become smaller in larger networks (Fig. 4c). Thus, even if the basin of attraction of the target state cannot be reached by any eligible perturbation, it may nonetheless be possible to drive the network to a similar state using our control procedure.
Control of desynchronization instabilities in power-grid networks
In the design and operation of power-grid networks, an important consideration is the ability of the power generators to maintain synchrony following perturbations27,28. Desynchronization instabilities have in fact been implicated in cascading failures underlying major recent blackouts29. The state of the system is assumed to be determined by the swing equation,
where N is the number of generators in the network and δi and ωi are the phase and angular frequency of generator i, respectively. The constant Hi is the inertia parameter of the generator, is the mechanical input power from the generator, and is the power demanded of the generator by the network30. The network structure and impedance parameters are incorporated into the matrices D′=() and D′′=(), and the damping is accounted for by the coefficient Di. In equilibrium, and all generators operate in a synchronous state, characterized by ω1=ω2=…=ωN. We illustrate our control procedure on the New England power-grid model31, which operates at the nominal synchronization frequency ωs=2π × 60 rads−1 and consists of 10 generator nodes, 39 load nodes, and 46 transmission lines (Fig. 5a). We implement this simple model for the parameter values given in Susuki et al.30.
For an initially steady-state solution determined by power flow calculations, we simulate single-line faults caused by short circuits to the ground for a period of 0.6 s, during which the corresponding impedance is assumed to be very small (z=10−9j) and at the end of which the fault is cleared by disconnecting the line. Figure 5 shows one such fault on the line connecting nodes 16 and 17 (Fig. 5a) and the corresponding time evolution of the δi and ωi for all generators in the network (Fig. 5b–d). By the time the fault is cleared, the generators have lost synchrony, and in the absence of any intervention, they continue accelerating away from one another (Fig. 5b). Nonetheless, the perturbed network admits a stable steady-state synchronous solution characterized by a new set of generator phases and a synchronization frequency only slightly different from ωs. In asking whether loss of synchrony can be averted by an appropriate compensatory perturbation following the fault, for illustrative purposes we assume that direct modification of the generator phases δi is prohibited and only perturbations to the generator frequencies ωi are allowed.
A naive approach would be to reset the generator frequencies to the corresponding values at the target state after the fault, but, for not accounting for the full 2N dimensions of the state space, this approach fails and the system still loses synchrony, albeit at a later time (Fig. 5c). Using our iterative network control procedure, however, one can identify a post-fault intervention that maintains bounded generator oscillations in the short term (Fig. 5d, left), and eventually causes the perturbed network to evolve to the desired target state (Fig. 5d, right). Out of the 92 possible single-line fault perturbations of the type described above, 43 cause the perturbed network to evolve to an undesirable final state in which the generators have lost synchrony. Of these, 27 cases can be controlled under the constraints described above. In each of the cases in which our method fails to find a compensatory perturbation, naive heuristic interventions—specifically, resetting the generators identically to either the nominal frequency or the synchronization frequency at the target state—also fail, suggesting that these perturbed networks may be impossible to control under the given constraints.
Discussion
The dynamics of large natural and man-made networks are usually highly nonlinear, making them complex not only with respect to their structure but also with respect to their dynamics. Nonlinearity has been the main obstacle to the control of such systems, and this is well reflected in the state of the art in the field32,33. Progress has been made in the development of algorithms for decentralized communication and coordination34, in the manipulation of Boolean networks35, in network queue control problems36, and in other complementary areas. Methods have been developed for the control of networks hypothetically governed by linear dynamics37. However, although linear dynamics may approximate an orbit locally, control trajectories are inherently nonlocal38; moreover, linear dynamics does not permit the existence of the different stable states observed in real networks and does not account for basins of attraction and other global properties of the state space. These global properties are crucial because they underlie network failures and, as shown here, provide a mechanism for network control. This can be achieved under rather general conditions by systematically designing compensatory perturbations that take advantage of the full basin of attraction of the desired state, thus capitalizing on (rather than being obstructed by) the nonlinear nature of the dynamics.
Applications show that our approach is effective even when compensatory perturbations are limited to a small subset of all nodes in the network, and when constraints forbid bringing the network directly to the target state. From a network perspective, this frequently leads to counterintuitive situations in which the compensatory perturbations are in an opposite direction from that towards the target state—for example, suppressing nodes that are already less active than at the target. These results are surprising in light of the usual interpretation that nodes represent ‘resources’ of the network, to which we then intentionally (albeit temporarily) inflict damage with a compensatory perturbation. The same holds true for the converse, as demonstrated in the T-cell survival signalling network. There the goal is to induce cell death, which, counterintuitively, is often achieved through perturbation towards the (active) cancer state. From the state space perspective, the reason for the existence of such locally deleterious (beneficial) perturbations that have globally beneficial (deleterious) effects is that the basin of attraction, being nonlocal, can extend to the region of feasible perturbations even when the target itself does not.
We have motivated our problem assuming that the network is away from its desired equilibrium due to an external perturbation. In particular, as shown in our example of desynchronization failures in a power-grid, our approach can be used for the real-time rescue of a network, bringing it to a desirable state before it reaches a state that can be temporarily or permanently irreversible. We suggest that this can be important for the conservation of ecological systems and for the creation of self-healing infrastructure systems. On the other hand, as illustrated in our associative memory example, our approach also applies to move the network from one stable state to another, thus providing a mechanism for ‘network reprogramming’.
As a broader context to interpret the significance of this application, consider the reprogramming of differentiated (somatic) cells from a given tissue into a pluripotent stem cell state, which can then differentiate into cells of a different type of tissue. The seminal experiments demonstrating this possibility involved continuous overexpression of specific genes39, which is conceivable even under the hypothesis that cell differentiation is governed by the loss of stability of the stem cell state40. However, the recent demonstration that the same can be achieved by the temporary expression of few proteins41 or transient administration of messenger RNA42 indicates that the stem cell state may have remained stable (or metastable) after differentiation, allowing interpretation of the reprogramming process in the context of the interventions considered here. While induced pluripotency is an example par excellence of network reprogramming, the same concept extends far beyond this particular system. Taken together, our results provide a new foundation for the control and rescue of network dynamics and, as such, are expected to have implications for the development of smart traffic and power-grid networks, of ecosystems and Internet management strategies, and of new interventions to control the fate of living cells.
Methods
Identification of compensatory perturbations
We identify compensatory perturbations iteratively as follows. Given the current initial state of the network, , we integrate the system dynamics over a time window t0 ≤t≤t0+T to identify the time of the orbit’s closest approach to the target, tc≡ arg min|x*−x(t)|. We then integrate the variational equation up to this time to obtain the corresponding variational matrix, M(tc), which maps a small change δ x0 to the initial state of the network to a change δ x(tc) in the resulting perturbed orbit at tc according to δ x(tc)=M(tc)·δ x0. This mapping is used to select an incremental perturbation δ x0 to the current initial state that minimizes the distance between the perturbed orbit and the target at time tc, subject to the constraints (2) on the eligible perturbations, as well as additional constraints on δ x0 to ensure the validity of the variational approximation (Constraints on incremental perturbations, below). This selection is performed via a nonlinear optimization (Nonlinear optimization, below). The initial condition is then updated according to →+δ x0, and we test whether the new initial state lies in the target's basin of attraction by integrating the system dynamics over a long time τ. If the system’s orbit reaches a small ball of radius κ around x* within this time, we declare success and recognize x0− as a compensatory perturbation (for the updated x′0). If not, we calculate the time of closest approach of the new orbit and repeat the procedure, up to a maximum number I of iterations.
Constraints on incremental perturbations
The incremental perturbation at the point of closest approach, δ x(tc), selected under constraints (2) alone will generally have a non-zero component along a stable subspace of the orbit x(t), which will result in δ x0 larger than δ x(tc) by a factor of up to , where is the finite-time Lyapunov exponent of the eigendirection corresponding to the eigenvalue of M(x0, tc) with smallest-magnitude real part. In a naive implementation of this algorithm, to keep δ x0 small for the linear transformation to be valid, the size of δ x(tc) would be negligible, leading to negligible progress. This problem is avoided by optimizing the choice of δ x(tc) under the constraint that the size of δ x0 is bounded above. Another potential problem is when the perturbation causes the orbit to cross an intermediate basin boundary before reaching the final basin of attraction. All such events can be detected by monitoring the difference between the linear approximation and the full numerical integration of the orbit, without requiring any prior information about the basin boundaries. Boundary crossing is actually not a problem because the closest approach point is reset at each iteration and, in particular, on the new side of the basin boundary. To assure that the method will make satisfactory progress at each iteration, we solve the optimization problem under the constraint that the size of δ x0 is also bounded below, which means that we accept increments δ x0 that may temporarily increase the distance from the target. These upper and lower bounds can be expressed as
This can lead to due to components along the unstable subspace, but in such cases the vectors can be rescaled after the optimization. At each iteration, the problem of identifying a perturbation δ x0 that incrementally moves the orbit toward the target under constraints (2) and (5) is then solved as a constrained optimization problem. To avoid back-and-forth oscillations, we require the inner product between the two consecutive increments δ x0 to be positive. The resulting iterative procedure behaves well as long as , which can be assured by properly choosing ε0 and ε1, where is the actual change in the orbit at tc measured when the orbit is integrated anew at the subsequent iteration. In practice, the approach does not depend critically on very accurate forecasting of δ x(tc) at any single iteration so long as it moves the orbit closer to the target, and it is observed to be effective for a rather wide range of parameters ε0 and ε1.
Nonlinear optimization
The optimization step of the iterative control procedure consists of finding the small perturbation δ x0 that minimizes the remaining distance between the target, x*, and the system orbit x(t) at its time of closest approach, tc. Constraints are used to define the admissible perturbations (2) and also, as described in the previous paragraph, to limit the magnitude of δ x0 (5). The optimization problem to identify δ x0 can then be succinctly written as:
where (10) is enforced starting from the second iteration, and denotes the incremental perturbation from the previous iteration. Formally, this is a nonlinear programming problem, the solution of which is complicated by the non-convexity of the constraint (9) (and possibly (7) and (8)). Nonetheless, a number of algorithms have been developed for the efficient solution of nonlinear programming problems, among them sequential quadratic programming43. This algorithm solves (6) subject to (7)–(10) as the limit of a sequence of quadratic programming subproblems, in which the constraints are linearized in each substep. For all calculations, we use the sequential quadratic programming algorithm44 implemented in the SciPy scientific programming package ( http://www.scipy.org/). In all systems, we use dimensionless distances. In the case of the power-grid network, this is implemented by normalizing frequency by the target frequency, which further avoids disparate scales between the frequency and phase variables. More generally, while the norm in (6) may denote the usual Euclidean norm for most systems, there is nothing in our formulation of the control procedure that prohibits optimizing closeness according to a different metric in a particular network, especially if the dynamical variables represent different quantities or are otherwise not of the same order.
Values of parameters
For the values of the parameters κ, τ, I, ε0, ε1 and T used in the example applications of this paper, as well as criteria for choosing their values in the general case, we refer the reader to the Supplementary Methods and Supplementary Table S1.
T-cell survival signalling network
The network consists of 60 nodes, 54 of which are equipped with dynamics and represent the state of the network, while 6 are static input nodes (Stimuli, TAX, CD45, PDGF, Stimuli2 and IL15)22,23. Following Zhang et al.22 and Saadatpour et al.23, we set Stimuli, IL15 and PDGF at ON (one) and set TAX, CD45 and Stimuli2 at OFF (zero) for all simulations. We translate the Boolean network dynamics given in Saadatpour et al.23 into an equivalent continuous form using the method described in Wittmann et al.45 The state variable xi representing the activity of each node is thus allowed to assume values in the range [0,1]. The associated dynamics follows
Here Bi is a continuous analogue of the discrete Boolean update rule for node i, which would take the current state (ON or OFF) of all nodes as an input and output the state of node i at the next time step. The function Bi is obtained via multilinear interpolation of the associated logical function between the ‘corners’ of the N-dimensional unit cube (in which the value of each node is either 0 or 1). To capture the switch-like behaviour observed in signalling circuits, the state of each node is passed through a sigmoidal (Hill-type) function f(x)=x4/(x4+k4) before it is used as an input to the continuous logical gates Bi. Nodes are considered to be ON (OFF) if the associated xi is significantly above (below) the threshold k, which we take to be 0.5. The generation of the continuous model dynamics was done automatically with the software package Odefy46. We observe three stable fixed points in the network. One fixed point corresponds to the normal cell state (the target state in our simulations), in which the node representing apoptosis is ON and all other dynamical nodes are OFF. The two other fixed points are biologically equivalent (differing only by node P2, which can be either ON or OFF) and correspond to the cancer state. The three attractors, as defined by the associated ON/OFF states of the individual nodes, are identical to those found in Saadatpour et al.23.
Additional information
How to cite this article: Cornelius, S. P. et al. Realistic control of network dynamics. Nat. Commun. 4:1942 doi: 10.1038/ncomms2939 (2013).
References
Motter, A. E. Improved network performance via antagonism: From synthetic rescues to multi-drug combinations. Bioessays 32, 236–245 (2010).
Barabási, A. -L., Gulbahce, N. & Loscalzo, J. Network medicine: A network-based approach to human disease. Nature. Rev. Genet. 12, 56–68 (2011).
Carreras, B. A., Newman, D. E., Dobson, I. & Poole, A. B. Evidence for self-organized criticality in a time series of electric power system blackouts. IEEE T. Circuits-I 51, 1733–1740 (2004).
Buldyrev, S. V., Parshani, R., Paul, G., Stanley, H. E. & Havlin, S. Catastrophic cascade of failures in interdependent networks. Nature 464, 1025–1028 (2010).
Pace, M. L., Cole, J. J., Carpenter, S. R. & Kitchell, J. F. Trophic cascades revealed in diverse ecosystems. Trends Ecol. Evol. 14, 483–488 (1999).
Scheffer, M., Carpenter, S., Foley, J. A., Folke, C. & Walker, B. Catastrophic shifts in ecosystems. Nature 413, 591–596 (2001).
Helbing, D. Traffic and related self-driven many-particle systems. Rev. Mod. Phys. 73, 1067–1141 (2001).
Vespignani, A. Predicting the behavior of techno-social systems. Science 325, 425–428 (2009).
May, R. M., Levin, S. A. & Sugihara, G. Complex systems: ecology for bankers. Nature 451, 893–895 (2008).
Haldane, A. G. & May, R. M. Systemic risk in banking ecosystems. Nature 469, 351–355 (2011).
Motter, A. E., Gulbahce, N., Almaas, E. & Barabási, A. -L. Predicting synthetic rescues in metabolic networks. Mol. Syst. Biol. 4, 168 (2008).
Sahasrabudhe, S. & Motter, A. E. Rescuing ecosystems from extinction cascades through compensatory perturbations. Nat. Commun. 2, 170 (2011).
Dobson, I., McCalley, J. & Liu, C. -C. Fast Simulation, Monitoring, and Mitigation of Cascading Failure Power Systems Engineering Research Center (PSERC) Publication10–18 University of Wisconsin System and Iowa State University (2010).
Anghel, M., Werley, K. A. & Motter, A. E. Stochastic model for power grid dynamics. Proceedings of the 40th International Conference on System Sciences HICSS'07, Waikoloa, Big Island, HI, USA,Vol. 1, 113 (2007).
Carreras, B. A., Lynch, V. E., Dobson, I. & Newman, D. E. Critical points and transitions in an electric power transmission model for cascading failure blackouts. Chaos 12, 985–984 (2002).
Motter, A. E. Cascade control and defense in complex networks. Phys. Rev. Lett. 93, 098701 (2004).
Cornelius, S. P., Lee, J. S. & Motter, A. E. Dispensability of Escherichia coli's latent pathways. Proc. Natl Acad. Sci. USA 108, 3124–3129 (2011).
Zhong, N. Computational unsolvability of domains of attraction of nonlinear systems. Proc. Am. Math. Soc. 137, 2773–2783 (2009).
Genesio, R., Tartaglia, M. & Vicino, A. On the estimation of asymptotic stability regions: state of the art and new proposals. IEEE T. Automat. Contr. 30, 747–755 (1985).
Kaslik, E., Balint, A. M. & Balint, S. t. Methods for determination and approximation of the domain of attraction. Nonlinear Anal. 60, 703–717 (2005).
Sokol, L. & Loughran, T. P. Jr. Large granular lymphocyte leukemia. Oncologist 11, 263–273 (2006).
Zhang, R. et al. Network model of survival signaling in large granular lymphocyte leukemia. Proc. Natl Acad. Sci. USA 105, 16308–16313 (2008).
Saadatpour, A. et al. Dynamical and structural analysis of a T Cell survival network identifies novel candidate therapeutic targets for large granular lymphocyte leukemia. PLoS Comput. Biol. 7, e1002267 (2011).
Hopkins, A. L. Network pharmacology: the next paradigm in drug discovery. Nat. Chem. Biol. 4, 682–690 (2008).
Nishikawa, T., Lai, Y. -C. & Hoppensteadt, F. C. Capacity of oscillatory associative-memory networks with error-free retrieval. Phys. Rev. Lett. 9, 108101 (2004).
Hoppensteadt, F. C. & Izhikevich, E. M. Weakly Connected Neural Networks Springer-Verlag (1997).
Anderson, P. M. & Fouad, A. A. Power System Control and Stability, 2nd ed. IEEE Press-Wiley Interscience (2003).
Motter, A. E., Myers, S. A., Anghel, M. & Nishikawa, T. Spontaneous synchrony in power-grid networks. Nat. Phys. 9, 191–197 (2013).
Andersson, G. et al. Causes of the 2003 major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance. IEEE T. Power Syst. 20, 1922–1928 (2005).
Susuki, Y., Mezić, I. & Hikihara, T. Global swing instability in the New England power grid model. American Control Conference: St. Louis, MO, USA, (2009).
Athay, T., Podmore, R. & Virmani, S. A practical method for the direct analysis of transient stability. IEEE T. Power App. Syst. 98, 573–584 (1979).
Liu, Y. -Y., Slotine, J. -J. & Barabási, A. -L. Controllability of complex networks. Nature 473, 167–173 (2011).
Nepusz, T. & Vicsek, T. Controlling edge dynamics in complex networks. Nat. Phys. 8, 568–573 (2012).
Bullo, F., Cortés, J. & Martínez, S. Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms Princeton Univ. Press (2009).
Shmulevich, I. & Dougherty, E. R. Probabilistic Boolean Networks: The Modeling and Control of Gene Regulatory Networks SIAM (2009).
Meyn, S. P. Control Techniques for Complex Networks Cambridge Univ. Press (2008).
Lin, C. -L. Structural controllability. IEEE T. Automat. Contr. 19, 201–208 (1974).
Sun, J. & Motter, A. E. Controllability transition and nonlocality in network control. Phys. Rev. Lett. 110, 208701 (2013).
Takahashi, K. & Yamanaka, S. Induction of pluripotent stem cells from mouse embryonic and adult fibroblast cultures by defined factors. Cell 126, 663–676 (2006).
Huang, S., Guo, Y. P., May, G. & Enver, T. Bifurcation dynamics in lineage-commitment in bipotent progenitor cells. Dev. Biol. 305, 695–713 (2007).
Kim, D. et al. Generation of human induced pluripotent stem cells by direct delivery of reprogramming proteins. Cell Stem Cell 4, 472–476 (2009).
Warren, L. et al. Highly efficient reprogramming to pluripotency and directed differentiation of human cells with synthetic modified mRNA. Cell Stem Cell 7, 618–630 (2010).
Boggs, P. T. & Tolle, J. W. Sequential quadratic programming. Acta Numerica 4, 1–51 (1995).
Kraft, D. A software package for sequential quadratic programming. Technical report DFVLR-FB, Institut für Dynamik der Flugsysteme. Oberpfaffenhofen 88–28 (1988).
Wittmann, D. M. et al. Transforming Boolean models to continuous models: Methodology and application to T-cell receptor signaling. BMC Syst. Biol. 3, 98 (2009).
Krumsiek, J., Pölsterl, S., Wittmann, D. M. & Theis, F. J. Odefy-from discrete to continuous models. BMC Bioinformatics 11, 233 (2010).
Acknowledgements
We thank Jie Sun for illuminating discussions. This work was supported by NSF under Grant DMS-1057128, NCI under Grant 1U54CA143869-01 and a Northwestern-Argonne Early Career Investigator Award to A.E.M.
Author information
Authors and Affiliations
Contributions
S.P.C., W.L.K. and A.E.M. conceived the study; S.P.C. performed the numerical experiments; S.P.C. and A.E.M. analysed the data; and S.P.C. and A.E.M. wrote the manuscript. All authors approved the final version of the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing financial interests.
Supplementary information
Supplementary Information
Supplementary Figures S1-S8, Supplementary Table S1, Supplementary Methods, Supplementary Discussion and Supplementary References (PDF 3539 kb)
Supplementary Movie 1
Iterative network control procedure. Three-part video animating the step-by-step construction of the compensatory perturbations shown in Supplementary Figure S4a (part I) and Supplementary Figure S4b (part II), and an illustration of the resulting procedure on the two-gene system shown in Supplementary Figure S7a (part III). (AVI 8446 kb)
Rights and permissions
About this article
Cite this article
Cornelius, S., Kath, W. & Motter, A. Realistic control of network dynamics. Nat Commun 4, 1942 (2013). https://doi.org/10.1038/ncomms2939
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/ncomms2939
This article is cited by
-
Controlling complex networks with complex nodes
Nature Reviews Physics (2023)
-
Identifying important nodes in complex networks based on extended degree and E-shell hierarchy decomposition
Scientific Reports (2023)
-
Emergence and suppression of chaos in small interdependent networks by localized periodic excitations
Nonlinear Dynamics (2023)
-
NETISCE: a network-based tool for cell fate reprogramming
npj Systems Biology and Applications (2022)
-
Reviving a failed network through microscopic interventions
Nature Physics (2022)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.