Abstract
Controllability and observability of complex systems are vital concepts in many fields of science. The network structure of the system plays a crucial role in determining its controllability and observability. Because most naturally occurring complex systems show dynamic changes in their network connectivity, it is important to understand how perturbations in the connectivity affect the controllability of the system. To this end, we studied the control structure of different types of artificial, social and biological neuronal networks (BNN) as their connections were progressively pruned using four different pruning strategies. We show that the BNNs are more similar to scalefree networks than to smallworld networks, when comparing the robustness of their control structure to structural perturbations. We introduce a new graph descriptor, ‘the cardinality curve’, to quantify the robustness of the control structure of a network to progressive edge pruning. Knowing the susceptibility of control structures to different pruning methods could help design strategies to destroy the control structures of dangerous networks such as epidemic networks. On the other hand, it could help make useful networks more resistant to edge attacks.
Introduction
Graphs are a powerful conceptual framework to understand the behaviour of complex systems that involve a large number of interactions among their constituents^{1,2,3}. In most chemical, biological, social and to some extent in engineering systems (e.g. electrical power grid), the intrinsic dynamics of the nodes is largely fixed, but the network structure (node count and edges between nodes) continuously changes due to edge failures, evolutionary modifications and activitydependent short and longterm plasticity mechanisms. Thus, it is reasonable to assume that part of the complexity of a system arises due to the structural perturbations in the underlying network. Interestingly, many graph descriptors may remain unaffected by structural perturbations, such as changes in the counts of nodes, edges, or the degree of nodes. That is, the invariance of some graph descriptors (e.g. shortest path length, global efficiency^{2}) to structural perturbations could be a reason underlying the robustness and error tolerance of such complex systems^{4}.
Therefore, there is a growing interest in relating graph properties to the system dynamics. Indeed, several graph theoretic descriptors of a complex system are correlated with some important dynamical properties of the system^{3,5,6,7,8,9,10}. Despite this correlation between structure and dynamics, individual graph descriptors are in many cases insufficient to relate the structure of the graph to the system dynamics. This was most clearly observed in a recent attempt to relate network structure to the dynamics and stimulus response of a network of biological neurons^{10,11}. One possible reason for this could be that a graph provides a static description of the system, in which the dynamics of the nodes is often ignored or simplified.
For practical applications, it is important to be able to steer a dynamical system to a desired state by forcing it externally (i.e. controllability) and to reconstruct the past dynamical trajectory from the current state of the system (i.e. observability). Thus, in a way controllability and observability define our understanding of a dynamical system.
Kalman^{12} showed that a full rank of the controllability and observability matrices ensures the controllability and observability of a system. Lin^{13} extended the notion of controllability to structural controllability and derived conditions that ensure the controllability of a network based only on the knowledge of connections without explicit information regarding their weights. Importantly, a minimum set of nodes, called controls, the stimulation of which would ensure full controllability of the system, can be obtained from the graph structure^{14,15,16,17}. Similarly, the smallest possible set of nodes required to observe the entire system, called sensors, can also be found from the graph. Thus, controls (or sensors) may provide a better description of the graph, as they are more closely related to key aspect of the system dynamics, than other graph properties.
Here, we studied the effect of structural perturbations in complex networks on their control structure. While the robustness of the structural properties of complex networks is well established, it is not clear how their controllability changes upon edge deletion. Therefore, we investigated the robustness of control count to deletion of edges with or without fragmenting the network. First, we proved the equality of the numbers of controls and sensors for a given network. Thus our analysis of controls extend to sensors as well. Next, we developed new edge deletion strategies and analyse their performance in different types of networks. Specifically, we compared the effectiveness of these pruning strategies in affecting the numbers of controls or sensors in various types of random networks (such as ErdosRenyi, small world, scalefree), social networks and biological neural networks – BNNs (largescale connectivity of the macaque and mouse brains and the neuronal network in C. elegans). By comparing the changes in control count for different types of complex networks and BNNs, we show that in terms of their controllability, BNNs resemble scalefree better than smallworld models. Finally, we introduced the notion of the cardinality curve of a complex network, not only to infer the performance of a pruning strategy, but also to extract important structural properties of the network and to compare different network structures.
Methods
Kalman controllability
Consider an ndimensional linear system:
where x (dimensions n × 1) is the state vector of the system, A (dimensions n × n) is the adjacency or transfer matrix of the system, B (dimensions n × m) is the input projection matrix, u (dimensions 1 × m) is the input vector, y (dimensions k × 1) is the output vector of the system, C (dimensions k × n) is the readout interaction matrix of the system and D (dimensions k × m) is the contribution of input u to the readout. m ≤ n is the number of inputs and k ≤ n is the number of readouts of the system.
The Kalman controllability criterion states that a linear system is controllable if the controllability matrix, (dimensions n × nm), has full rank^{12}. Similarly, the system is observable if the rank of the observability matrix, (dimensions n × nk), is n. The prime mark (′) denotes the transpose of the referred matrix. From these full rank conditions, we can ensure the observability and controllability of the system by appropriately choosing B and C.
Structural controllability
The two matrices A = (a_{i,j}) and are called structurally equivalent if they have the same pattern of zero entries and nonzero entries. That is,
A linear system is structurally controllable if there exists a controllable linear system with structurally equivalent connectivity and input matrices. Inaccessibility and dilation are two key properties of the network structure that determine the structural controllability of the system^{13} (cf. Fig. 1a). Inaccessibility occurs when a node cannot be reached from any input node. Dilation occurs when a parent node is driven to influence two or more children nodes at a time. To formally recall its concept on a linear system (interaction and input matrices (A, B)), we can consider a subset S of the system nodes and use the term vertex incover of S, denoted by T(S), to refer to the set of all nodes in A (from fellow nodes) or in B (from external input nodes) that are inneighbours to at least a node in S. A dilation is said to occur in a system if there exists a larger subset S of system nodes than its vertex incover (i.e. n(S) > n(T(S))). A network without any dilation and inaccessibility is structurally controllable. One must therefore preclude dilation and inaccessibility by providing appropriate input to a set of controls in order to establish a control structure in a network.
We use the term controls to describe the smallest set of inputs, {u_{i}(t)} in u(t) = (u_{1}(t), …, u_{m}(t))′ (eq. 1), that ensure the controllability of a linear system. The number of controls is denoted by nCN, which is also the number of control nodes or nodes in the system that are directly connected to the controls. The term control structure refers to a system with controls. Similarly, the sensors refer to the smallest set of outputs, {y_{i}(t)} in y(t) = (y_{1}(t), …, y_{k}(t))′ (eq. 1), that ensure the observability of a linear system. The number of sensors is also the number of sensor nodes or nodes in the system that are directly monitored by the sensors. The term observable structure refers to a system with a set of sensors.
Maximummatching extraction algorithm
Because there is no analytical expression available to calculate the number of control nodes, we will use the concept of maximummatching (MM) proposed by Liu et al.^{14}. A matching set in a digraph is a set of edges that do not share their source and terminal nodes. In other words, if two edges (a, b) and (c, d) belong to a matching set M of a digraph, a ≠ c and b ≠ d. A matching set is called maximal if it can allow no other edge from the network. It is called maximum if it is maximal and with the maximum possible cardinality^{18,19}. The nodes which are not targets of any edge in a matching set constitute a set of driving nodes for the controllability of the system. A similar set of nodes that are associated to a maximum matching (MM) set recruit a set of controls^{14}, a set of driving nodes with the minimum possible number.
Here, we used FordFulkerson’s maximum flow algorithm^{20} to extract MM sets. First, all nodes with nonzero outdegree are collected in one pool, while all nodes with nonzero indegree are collected in another pool, such that a directed bipartite graph could be formed from the first pool to the second. Therefore, a node with out and inneighbours belongs simultaneously to the two pools. Secondly, a global source node and a global target node are added outside the pools, such that the source node is connected to all nodes in the first pool and all nodes in the second pool are connected to the target node. Every edge is assigned a unit weight to compute maximum flow. The selected edges in a maximum flow correspond to an MM set (cf. Fig. 1b). As a result of the multiple choice of edges of many networks for the maximum flow, there are different options of MM sets and hence controls (cf. Supplementary Fig. S1).
Models of complex networks
To investigate the performance of the pruning strategies, we used biological, social and artificial random networks with different topologies. The biological networks includes the longdistance regional connectivity of the macaque brain^{21}, the mesoscale connectivity map of the mouse brain^{22} and the neuronal network connectivity in C. elegans^{23}. We used Google+^{24}, Facebook^{25}, Airport^{26}, Amazon^{27}, PeertoPeer^{28,29}, EUemail^{29} and Wikipediavote^{30} networks in the category of social and related networks for our demonstration. The artificial networks included random^{31}, smallworld^{23} and scalefree networks (see the Supplementary Information: Network generation procedures). To create scalefree networks, three models were used; namely, BarabásiAlbert, duplication divergence and local attachment models^{32,33,34,35,36}. Table 1 summarizes the basic statistical features of the networks.
Edge pruning strategies
We used conditioned and unconditioned pruning methods. In conditioned pruning approach, a pruning strategy takes care of keeping the network intact. That is, a pruning strategy will not delete an edge if its deletion results in fragmentation of the network. The unconditioned pruning approach does not obey this additional condition and could cause multiple components at any stage of pruning. A network of size n will have at least n − 1 edges at the end of a conditioned exhaustive pruning strategy, where as it will have no edge after an unconditioned pruning strategy. Under each of these two categories, we considered the following four exhaustive pruning strategies.
Random pruning
This model selects an edge randomly and removes it from the network (in unconditioned case) unless it fragments the network (in conditioned case). The deletion was performed repeatedly until every edge was deleted. This is the most intuitive and simple pruning strategy and full network connectivity is not necessary to implement it as edges are selected at random for deletion.
Outpruning
In this pruning model, we started by randomly selecting a node and systematically removed its outgoing projections. Once the outgoing edges of the chosen node were exhausted, another node was picked randomly to repeat the pruning procedure. Similar to random pruning, the trimming procedure was performed until no edge is remained in the network (unconditioned) or until a last spanning digraph (conditioned). In this procedure, there is no special significance to the pruning of outgoing edges and similar results would be obtained if pruning were performed based on the incoming edges. Like random pruning, we do not need to know the full connectivity of the network because pruning is performed on a node by node basis.
Ordered maximum matching (orderedMM) pruning
This pruning method requires the knowledge of the full network connectivity. Here, we first ordered the edges E of the network after exhaustive extraction of maximum matching sets. The first maximum matching (MM) set takes all edges into account, while the subsequent ones are maximum matching sets of the remaining edges, excluding the already extracted sets.
Hence, E_{i} ≥ E_{j} if i < j. Here, A ≤ _{MM} B denotes ‘A is a maximum matching set of B’. Clearly, E_{1}, …, E_{l} form a partition of the set of all edges in the network. Each edge in the network belongs to some block, E_{k}, in the partition. The relative rank, rel. rank, of an edge is then defined as the cardinality of the block it belongs to. For edge e ∈ E,
The deletion was performed in decreasing order of relative rank, i.e. all edges belonging to E_{1} were the first to be trimmed in any order. The procedure was repeated for all partitions according to the order of their indices.
We based this pruning strategy on the procedure we used to extract the controls. To understand, we need to recall the notion of cactus as proposed by Lin^{13}. A cactus is a connected digraph consisting of nonoverlapping buds (directed cycles) and a stem (simple directed path) such that a node in each bud has an incoming edge (called distinguished edge) from a distinct node on the stem. That is, two distinguished edges cannot share the same node in a cactus. Because a stem is a budless cactus, an isolated node in a network can be included as a degenerate cactus by its incoming edge from a control node. To design a control structure with minimum number of inputs, one needs to find some minimum spanning cacti (MSC)^{13}  that is, the smallest possible cacti that together span the network. The number of the MSC determines the number of controls. Moreover, all the edges of the cacti excluding the distinguished edges form the corresponding MM set to the control nodes, which is equivalent to E_{1} (eq. 3). That is, E_{i} contains all the edges in all the distinct directed cycles and simple paths in the set of MSCs at the i^{th} stage of network pruning (after the edges in were removed). Thus, orderedMM pruning could be regarded as an MSC destructor, because it targets edges of high relative rank, thereby forming an extreme case of pruning.
Resilient pruning
This pruning strategy is aimed at keeping the controllability profile of the network resilient to edge deletion. To this end, we designed three different methods. The first one was similar to the orderedMM pruning but in the reverse order, i.e. in a partition {E_{1}, E_{2}, …, E_{l}} of E, where E_{i} ≥ E_{j}wheneveri < j, the order of deletion was performed from E_{l} to E_{1}. That is, the edges that were part of the maximum matching set corresponding to the original network were pruned only after all other edges were systematically removed. Thus, by definition there was no change in the control structure of the network almost for the entire deletion. The supplementary information includes a brief description of the three different ways of resilient pruning implementation (see the Supplementary Information: Alternative implementations of resilient pruning).
Both orderedMM pruning and resilient pruning required ordering all edges based on their relative rank (cf. eq. 4). According to the partitioning of edges as described in eq. 3, the cardinality of a maximum matching set determines the relative rank of the included edges, i.e. the higher the cardinality, the higher the rank order of the contained edges. While orderedMM pruning was performed in decreasing order of relative rank, resilient pruning was performed in increasing order. Random pruning and outpruning, however, required no knowledge of the relative rank of network edges. By design, resilient pruning is an extreme case in which a network would be sparsened without any change in the control node set, except when deleting the final few edges. By contrast, orderedMM pruning is another extreme strategy that should result in a maximal change in the driver node count.
Because the maximum matching set is not unique (cf. Supplementary Fig. S1) and depends on the initial conditions, we estimate the change in the controllability configuration for 50 different realizations of each pruning strategy and for each network type. We mainly performed exhaustive pruning. For each edge deletion, a set of controls was extracted m times corresponding to each deletion and their number, nCN, was stored. Therefore, a single realization extracts controls m times, corresponding to each deletion. To enhance random sampling, the network nodes were reindexed for each realization. In other words, each strategy first chose a random permutation matrix P to reindex the connectivity matrix A as P^{−1}AP, such that nodes and edges could have different IDs for each realization.
Quantitative measures of pruning
The rate of change of control count (R_{C})
To quantify how fast a pruning strategy changes the number of controls nCN, we calculate the slope (R_{C}) with respect to the fraction of deleted edges. R_{C} counts the changes in elevation between the initial and final edge deletion stage of interest. The mean slope of the overall performance of a pruning strategy is simply the slope from the first to the last deletion.
where, ∆L stands for the change in the number of edges. nCN_{i} denotes the number of controls after the deletion of i edges. δ refers to the Kronecker delta function.
Pruning Damage Index (PDI)
To compare the overall damage caused by any pair of pruning procedures, we define the pruning damage index (PDI) for a pruning strategy (ps ∈ Random, Out, Ord–MM, Resilient), from d_{i} to d_{f} deletion of edges as the normalized area between the pruning curve and the baseline (i.e. the horizontal line of the initial control size nCN_{0}) of the network. With Δd: = d_{f} − d_{i} + 1 and N: = size of the network,
when d_{i} = 0 and d_{f} is the number of edges in the network, PDI is referred to as the exhaustive pruning performance index (ePDI), to quantify the overall damage of an exhaustive pruning strategy.
Results
Here, we investigated the robustness of various complex networks and BNN to structural perturbation. Specifically, we estimated the control structure by the number of controls that ensured structural controllability of the system. While the emphasis is on the controllability, it is directly related to the notion of ‘structural observability’ which allows for the reconstruction of system trajectories from a small number of sensors. We first proved that the numbers of controls and sensors are equal, thereby, we argue that our results are also valid for the estimation of sensors in a complex network.
Equality of optimal number of controls and sensors
Theorem: The numbers of controls and sensors required for controllability and observability of a linear system are equal.
The proof follows from the wellknown theorem of controllabilityobservability duality. If we have a pair of linear systems as:
the duality theorem implies that the controllability grammian of the first system (eq. 7) and the observability grammian of the second system (eq. 8) are equal.
Structurally, it further reveals that the number of controls of a linear system with system matrix A is equal to the number of sensors of a linear system with A′ as system matrix. It is clear that the numbers of controls of the two systems are equal as their system matrices are transposes of each other. Therefore, the number of controls and the number of sensors are equal.
This result ensures that any statement made about the optimal number of controls is also valid for the optimal number of sensors. Moreover, the number of sensors or controls cannot be less than the number of leaf nodes or source nodes of the network. A leaf node or simply a leaf in a network is a node without any outgoing edge, while a node in a network is called a source node if it does not have any incoming edge.
Performance of the pruning strategies on complex random networks
To understand how changes in the network structure affect the controllability configuration of complex artificial and biological networks, we estimated the change in the number of controls (nCN) as we progressively pruned the edges and, thereby, sparsened the network. Because, structural controllability requires full accessibility^{13}, it is expected that the number of controls will increase as the edges are pruned upon sparsening. However, the maximum matching of an adjacency matrix depends also on the probability of pairwise connections and directed cycles of multiple nodes. In fact, complex networks with the same average connection probability show different controllability configurations, depending on the structure of the network^{14,32}. Therefore, we estimated the control profile of several different types of complex artificial networks for progressive pruning of the edges.
Because there is no standard pruning strategy available, we first designed four different pruning strategies (see Methods). Two intentional edgeattack strategies were derived from the procedure we used to extract the control nodes (orderedMM and resilient pruning). These two pruning strategies require knowledge of the full connectivity, both to initiate the pruning process and to calculate the controllability profile. When the full network connectivity is not available, pruning could be implemented by random deletion of known edges (random pruning) or by progressively removing projections of randomly chosen nodes (outpruning).
We studied the effect of the four pruning strategies on complex networks with average connection probability of ≈5%. Complex networks with higher connection probability usually have very few controls^{14} or they show no change in the control structure for the first stage of edge deletion. Most complex artificial networks studied here showed considerable robustness to random pruning, even if nearly fifty percent of the edges were pruned (cf. Fig. 2a–l red traces). In random, smallworld and other WattsStrogatz complex networks with ≈5% or more average connection probability, there are many more edges which are not included in the maximum matching set and the edges which are part of the maximum matching set could be replaced by other edges (see section MM cardinality curve). Therefore, even for up to 50% pruning (average connection probability ≈2.5%), the cardinality of a maximum matching set remained largely unaffected in these networks. However, as the networks became progressively sparser, the network reached a structure where the edges inside the MM set could no longer be replaced by other edges, resulting in a sharp increase in the number of controls (see also Supplementary Fig. S2).
While in random pruning, we randomly chose the edges to be pruned, in outpruning, we randomly selected a node and progressively removed its outgoing edges. Outpruning promoted the formation of leaves without much decrease in the average connection probability in the network. If the transpose was considered (‘inpruning’), many sources tended to be formed. Leaves, by definition, cannot control other nodes and, therefore, increase the number of controls. Similarly, source nodes, without any incoming edge, are evidently part of any set of controls. Thus, the outpruning strategy is very effective in increasing the control count in complex networks with different topology and connection density (cf. Fig. 2). In addition, the efficacy of outpruning in increasing the control count could be further improved if, instead of selecting nodes at random, nodes were chosen based on their outdegree, indegree or degree (cf. Supplementary Fig. S3). These results hold for both conditioned and unconditioned pruning (see the section Conditioned pruning).
Different classes of complex networks show different sensitivities to the edge pruning strategies other than the resilient pruning. Most networks with powerlaw or exponential degree distribution (such as local attachment, BarabásiAlbert) show the highest sensitivity to orderedMM pruning, as expected (cf. Fig. 2d,e). In scalefree networks, orderedMM pruning is at least as effective as the outpruning in altering the controllability configuration (cf. Fig. 2f). However, in the WattsStrogatz (WS) spectrum of directed networks, orderedMM pruning is not the most severe in changing the controllability configuration of the networks (cf. Fig. 2a–c). To understand this, it is important to remember that smallworld networks are essentially ring lattices with a small proportion of rewired edges. Ring lattices have giant rings or long paths, which result in multiple disjoint maximum matching sets of same cardinality. Continuous extraction of MM sets, therefore, gives rise to many sets of nearly equal cardinality and, hence, the control count does not change with orderedMM pruning. In ErdosRenyii networks, orderedMM pruning, although performing better than in smallworld networks, remains less effective than outpruning due to basically the same reason, that is, the cardinalities of most MM sets are equal or show only little difference (MM cardinality curve).
Performance of the pruning strategies on social networks
Among realworld networks, social networks rapidly undergo large structural changes. Because most social networks are scalefree, we would expect orderedMM pruning would be most effective in increasing the nCN. To test this, we investigated seven different types of social networks (see Methods). Indeed, the effect of different pruning strategies on social networks is similar to their effect on artificially constructed scalefree networks. The Gnutella peertopeer network (dated August 31 2002) is not scalefree and, therefore, outpruning, instead of orderedMM pruning, was the most effective in increasing the nCN count (cf. Table 1, Fig. 3).
Performance of the pruning strategies on BNNs
Biological neuronal networks (BNNs) form another class of highly dynamic networks. Activitydependent structural plasticity, reorganization of synapses during development and learning and structural modification related to brain disease render the structure of BNNs highly dynamic^{37}. Therefore, studying the controllability of BNNs could provide key insights into developmentrelated pruning and improve our understanding how network function deteriorates upon loss of synapses in neurodegenerative diseases.
We found that in BNNs random pruning procedure results in an exponential dependence of the number of controls on the average degree of the network (cf. Supplementary Fig. S4). In BNNs, independent of the size of the network (or the species), both outpruning and orderedMM pruning result in similar changes in the controllability configuration (cf. Fig. 2g–i). This is similar to the scalefree networks and networks with exponential degree distribution (compare Fig. 2d–i). That is, BNNs are more similar to scalefree networks or to networks with exponential degree distribution than to smallworld networks in terms of their sensitivities to edgeattacks (cf. Fig. 2d–i).
Conditioned pruning
So far, the four pruning strategies were performed without any additional condition, so that the network could ultimately lose all its edges (cf. Fig. 2). We obtained similar results when we imposed a restriction on the exhaustive pruning strategies, i.e. not to fragment the networks (compare Supplementary Fig. S5 and Fig. 2).
The only difference between the ‘fragment’ and the ‘no fragment’ conditions was that in the former, the pruning process continued until the last edge in the network, whereas in the latter, pruning stopped when the network became a tree. That is, under the ‘no fragment’ condition, an exhaustive pruning strategy sparsened a complex network to one of its spanning directed trees (SDT) as its terminal structure. A spanning directed tree (SDT) of a network is a spanning subgraph without any cycle. Moreover, the SDTs resulting from different pruning strategies were different in terms of their control structure. For example, a terminal SDT of the macaque brain connectivity by the random pruning strategy required more controls than a terminal SDT by resilient pruning (compare the end points of the pruning lines in Fig. 3a or Supplementary Fig. S5).
To understand whether the terminal SDT affects the change in the control structure as a function of the pruning strategy, we further restricted the pruning criterion and imposed the additional condition that a predefined spanning subgraph should be preserved throughout the pruning process, such that all pruning strategies ended with that subgraph. Concepts of maximumleaf spanning tree^{38} or a tree with minimum vertex cover^{39} can be used to create an SDT of relatively many controls. In contrast, a long SDT with few branches can be chosen for few controls. We used the largescale interareal network of the macaque brain for demonstration and applied the four pruning strategies towards five different spanning subgraphs (Fig. 3a white circles. The SDT in Fig. 3b is a hubbased SDT (cf. Supplementary Information: Hubbased spanning directed tree.) The SDTs in Fig. 3c–d are the preferential SDT destinations of the exhaustive random and resilient pruning procedures, respectively.
Preserving only edges as few as the network size during pruning had a tremendous effect on the overall performance of the pruning strategies. If the network was pruned towards an SDT with more branching Fig. 3b all pruning strategies had a stronger effect on the rate of change of the fraction of the control count (R_{C}). If it was pruned towards an SDT with long paths Fig. 3d the R_{C} remained low. If an SDT with intermediate structure was preserved Fig. 3c R_{C} also became moderate.
We considered two more spanning digraphs with 3,000 edges, visited during random pruning Fig. 3e and outpruning Fig. 3f respectively. In the former, orderedMM pruning and random pruning were forced to slow down and speed up, respectively, to meet the pace of outpruning. In the latter, both orderedMM and outpruning were forced towards the random pruning trajectory. If a spanning digraph was selected anywhere along the horizontal part of the resilient pruning curve in (Fig. 3a cyan trace), all edge attacking strategies under the restriction of this chosen spanning digraph would end up to be ineffective and overlapped in a horizontal line.
In general, pruning under the restriction of a final network structure often resulted in a consistent order of performance. For example, in the macaque network, orderedMM pruning was the most effective in increasing the control count, followed by outpruning, random pruning and resilient pruning, respectively. However, the rate of change of nCN was different for each pruning strategy and the type of the preserved spanning subgraph. Importantly, these results also showed that the efficacy of a certain pruning strategy depends on both the initial and the final network structure. Unlike previous suggestions, in these networks at any stage of pruning, the number of control nodes could not be predicted from the count of strongly connected component (SCC)^{40} or the nodes with degree less than three^{15} (cf. Supplementary Fig. S6).
To measures the sensitivity of a network control structure to the pruning strategies between any two stages of edge attacks, we evaluated the pruning damage indices of three scalefree, a smallworld, a random, an intermediate WS, three biological and six social and related networks (cf. Fig. 4). The biological, social and related networks studied here show similarity with the scalefree network models with respect to their sensitivity to the pruning methods. Gnutella peertopeer network (See Table 1 and Fig. 4) exceptionally is more similar to the WattsStrogatz models. It is a good example of a social network that is not scalefree.
MM cardinality curve
In all complex networks studied here, the order of efficacy of three of the four pruning strategies, with the exception of orderedMM pruning, is preserved for the different networks (cf. Fig. 2, Supplementary Fig. S5). To better understand the efficacy of orderedMM pruning in changing the control structure of a network and why it behaves differently from the other three pruning strategies, we designed the cardinality curve.
Exhaustive extraction of maximum matching (MM) sets provides a way to partition the set of edges E in a network (cf. Methods: orderedMM pruning) i.e. , where MM_{1}: = a maximum matching set of E and . The indices 1, …, l of the blocks MM_{1}, …, MM_{l} of the partition indicate the order of extraction. The cardinality of MM_{k} decreases or remains the same as k increases, i.e. MM_{1} ≥ MM_{2} ≥ … ≥ MM_{l}. The cardinality curve refers to the cardinalities of MMs across their indices.
An edge in a network is critical in structural controllability if in its absence the network requires an additional control node^{14}. All the critical edges, if any, belong to any MM set. One can in fact identify all the critical edges of a complex network from just an MM set by checking each edge for criticality using a simple algorithm: delete edge, check the control count and add the edge back. However, many networks exist without or few critical edges (cf. Table 1). Therefore, MM set could be viewed as a generalization of critical edges, a few edges that likely cause high increase in the number of controls if removed. Moreover, partitioning the network edges in terms of successive MM sets is a way of sorting edges relatively based on their criticality.
Different artificial and biological networks show a decreasing sigmoid cardinality curve, with different threshold and slope (cf. Fig. 5a,b). The flat part of the cardinality curve shows that a network has multiple MM blocks of equal cardinality. Indeed, if there is a horizontal segment as part of the cardinality curve from j to k stages of MM extractions, the length k − j + 1 of the segment reveals the number of edgedisjoint sets of minimum spanning cacti (MSC) in the updated network with edge set . This implies that the network has different options of controls sets because it can use the disjoint sets of edges, thereby increasing the network robustness to orderedMM pruning (e.g. Fig. 5a, purple and cyan traces). On the other extreme, a monotonically decreasing cardinality curve indicates a rapid change in the control count, thereby making orderedMM pruning the most effective as, for instance, observed in scalefree networks (e.g. Fig. 5a, blue and green traces).
A larger size (Fig. 5c) and higher connection density (Fig. 5d) in ER networks contribute to a longer flat beginning of the cardinality curve. The similar decaying part of the cardinality curve indicates that the effect of orderedMM pruning of ER networks is independent of network size and connection density.
The cardinality curves of the BNNs (Fig. 5c) are similar to those of scalefree networks (D.D. and B.A.). This emphasizes once more that BNNs are more similar to scalefree networks than to smallworld networks, the cardinality curves of which start with a distinct flat part (cf. Fig. 5a,b).
MM cardinality curve reveals structural network properties
In addition to providing an intuitive understanding of the efficacy of orderedMM pruning, the cardinality curve also reveals different structural network properties. In fact, different network motifs result in characteristic cardinality curves (Fig. 5e).
On the one hand, the maximum value of the cardinality curve (CC_{max}) gives an estimate of the diameter of the network graph (Fig. 5e). The diameter of a graph is the maximum finite distance between a pair of nodes in a network^{41}. The number of MMs (N_{MM}), on the other hand, gives an estimate of the maximum indegree or outdegree of the network, whichever is larger. The CC_{max} and the number of MMs could be as large as the network size, N. When the CC_{max} = N, there is a giant directed cycle in the network. Moreover, the higher the value of CC_{max}, the smaller the number of source and leaf nodes in the network.
Similarly, N_{MM} provides insights on the degree distribution of the network. If N_{MM} is small compared to the network size, all nodes have only few neighbours. If N_{MM} is large, there is at least one hub in the network. Moreover, any point on the cardinality curve indicates the number of nodes (yaxis) and their corresponding max (indegree, outdegree) (xaxis). Finally, the area under the cardinality curve reflects the total number of edges and it can, hence, be used to estimate the connection density of the network.
The cardinality curve derived from the MM of a network is thus a very useful tool, not only to estimate the efficacy of different pruning strategies, but also to infer structural features of the network. It could be used to classify different complex networks.
Discussion
To the extent the dynamics of a complex system can be described by linear dynamics, structural controllability is a powerful tool to relate the network structure to the activity dynamics. Here, we quantified the robustness of complex networks (artificial, social and biological networks) in terms of their controllability. We studied the evolution of the control structure as we progressively pruned the network according to each one of four different strategies (Fig. 2). We show that the vulnerability of complex networks to edgeattack depends on the pruning strategy. Each of the four pruning strategies was performed exhaustively so that we could see not only the effect of ordinary or critical edge removal on the control structures of the original networks, but also on the successively updated networks. Two of our pruning strategies exploited the backbone of an optimal control configuration, minimum spanning cacti. While ordered MM pruning continuously targeted the edges in minimum spanning cacti^{13}, resilient pruning preserved them for later stages of deletion. We note that we here focused on minimizing the count of the controls. This meant that the identity of the controls could be different at each stage of pruning. Our results about the controllability of the network can be extended to their observability, because we have proved the equivalence of controls and sensors.
The control profile of most of the networks is robust to random edge deletion. However, it is possible to introduce a bigger change in the control profile by removing specific edges. For instance, intentional edgeattacks based on targeting the nodes with highest degree^{42} or higher betweenness centrality^{43} are more effective in changing the control profile than random edgeattacks. However, as we have shown here, it is possible to design other forms of intentional edgeattacks that either enhance or preserve the control node count. Resilient and orderedMM pruning strategies are the two extreme forms of intentional edgeattacks, as they are derived from the very process that we used to identify the control nodes. While resilient pruning preserves the control node count, orderedMM pruning induces a maximal increase in the control node count, except in the case of networks with high smallworld index.
After an edge attack, a subset of nodes could still remain controllable given the original set of controls. Such nodes could be identified based on their reachability from the original control nodes^{44}. By contrast, after every edge attack we recalculated the set of controls to ensure the controllability of the full network. Another approach to restore the controllability of the network could be to add new edges systematically by interconnecting long paths and form longer paths^{45}.
The change in the control node count could be transformed to calculate the ‘cardinality curve’. This new tool not only helps us quantify the efficacy of a pruning strategy to change the control structure of the network, but it could also be used to classify the network as scalefree, ErodosRenyii, smallworld or intermediate.
In fact, our comparison of the sensitivity of various network types to pruning suggests that BNNs are more similar to scalefree networks than to smallworld networks. In the last decade, a number of studies have suggested that the BNNs in different species resemble the smallworld topology^{46,47,48}. The smallworld topology is interesting because it improves the network communication while minimising the network wiring length^{47}. However, recent analyses suggest that BNNs may not be as similar to the smallworld networks as previously thought^{49,50}. For instance, the smallworld index of BNNs is much smaller than expected for smallworld networks^{49,51}. In general, classification of directed graphs based on their smallworld index is problematic because the average pathlength is not welldefined for many directed graphs (see Supplementary Information: Network generation procedures). The cardinality curve of various networks (Fig. 5) reveals that BNNs are, in fact, more similar to scalefree networks or to networks with exponential degree distribution than to smallworld networks (cf. Fig. 2).
One of the best example of progressive pruning is a BNN which undergoes massive pruning during early development^{52,53,54} or in degenerative brain diseases such as Alzheimer’s disease (AD)^{55,56}. Because different pruning strategies affect the nCN in a different manner, it is likely that the pruning strategy during development is different from the pruning that happens in AD. In general, studying the temporal evolution of the structural controllability of biological and other physical networks could provide insights into the structural organization of the network as well as to devise strategies to control their dynamics. Future work should investigate to what extent the predictions from the structural controllability can be extended to the dynamics of the networks undergoing structural changes.
Additional Information
How to cite this article: Mengiste, S. A. et al. Effect of edge pruning on structural controllability and observability of complex networks. Sci. Rep. 5, 18145; doi: 10.1038/srep18145 (2015).
References
Newman, M. E. The structure and function of complex networks. SIAM Rev. 45, 167–256 (2003).
Boccaletti, S., Latora, V., Moreno, Y., Chavez, M. & Hwang, D.U. Complex networks: Structure and dynamics. Phys. Rep. 424, 175–308 (2006).
Barabási, A.L. The network takeover. Nat. Phys. 8, 14 (2011).
Albert, R., Jeong, H. & Barabási, A.L. Error and attack tolerance of complex networks. Nature 406, 378–382 (2000).
Albert, R. & Barabási, A. Statistical mechanics of complex networks. Rev. Mod. Phys. 74, 47–97 (2002).
Rajan, K. & Abbott, L. Eigenvalue spectra of random matrices for neural networks. Phys. Rev. Lett. 97, 188104 (2006).
Arenas, A., DazGuilera, A., Kurths, J., Moreno, Y. & Zhou, C. Synchronization in complex networks. Phys Rep 469, 93–153 (2008).
Kitsak, M. et al. Identification of influential spreaders in complex networks. Nat. Phys. 6, 888–893 (2010).
Pernice, V., Staude, B., Cardanobile, S. & Rotter, S. How structure determines correlations in neuronal networks. PLoS. Comput. Biol. 7, e1002059 (2011).
Vlachos, I., Aertsen, A. & Kumar, A. Beyond statistical significance: implications of network structure on neuronal activity. PLoS. Comput. Biol. 8, e1002311 (2012).
Pernice, V., Deger, M., Cardanobile, S. & Rotter, S. The relevance of network microstructure for neural dynamics. Front. Comput. Neurosci. 7 (2013).
Kalman, R. E. Mathematical description of linear dynamical systems. J. Soc. Indus. Appl. Math. Ser. A 1, 152–192 (1963).
Lin, C. T. Structural controllability. IEEE Tran. Auto. Cont. 19, 201–208 (1974).
Liu, Y.Y., Slotine, J.J. & Barabási, A.L. Controllability of complex networks. Nature 473, 167–173 (2011).
Menichetti, G., Dall’Asta, L. & Bianconi, G. Network controllability is determined by the density of low indegree and outdegree nodes. Phys. Rev. Lett. 113, 078701 (2014).
Cowan, N. J., Chastain, E. J., Vilhena, D. A., Freudenberg, J. S. & Bergstrom, C. T. Nodal dynamics, not degree distributions, determine the structural controllability of complex networks. PLoS ONE 7, e38398 (2012).
Zhang, X., Lv, T., Yang, X. & Zhang, B. Structural controllability of complex networks based on preferential matching. PLoS ONE 9 (2014).
Rabin, M. O. & Vazirani, V. V. Maximum matchings in general graphs through randomization. J. Algor. 10, 557–567 (1989).
Hopcroft, J. E. & Karp, R. M. An n5/2 algorithm for maximum matchings in bipartite graphs. SIAM J. Comput. 2, 225–231 (1973).
Ford, L. R. & Fulkerson, D. R. Maximal flow through a network. Canad. J. Math. 8, 399–404 (1956).
Modha, D. S. & Singh, R. Network architecture of the longdistance pathways in the macaque brain. Proc. Nat. Acad. Sci. 107, 13485–13490 (2010).
Oh, S. W. et al. A mesoscale connectome of the mouse brain. Nature 508, 207–214 (2014).
Watts, D. J. & Strogatz, S. H. Collective dynamics of smallworld networks. Nature 393, 440–442 (1998).
Fire, M. et al. Computationally efficient link prediction in a variety of social networks. ACM Tran. Intell. Sys. Tech. (TIST) 5, 10 (2013).
Leskovec, J. & Mcauley, J. J. Learning to discover social circles in ego networks. Adv Neur In, 539–547 (2012).
Opsahl, T., Agneessens, F. & Skvoretz, J. Node centrality in weighted networks: Generalizing degree and shortest paths. Soc. Networks 32, 245–251 (2010).
Leskovec, J., Adamic, L. A. & Huberman, B. A. The dynamics of viral marketing. ACM Trans Web (TWEB) 1, 5 (2007).
Ripeanu, M., Foster, I. & Iamnitchi, A. Mapping the gnutella network: Properties of largescale peertopeer systems and implications for system design. arXiv preprint cs/0209028 (2002).
Leskovec, J., Kleinberg, J. & Faloutsos, C. Graph evolution: Densification and shrinking diameters. ACM Trans Knowl Discov Data 1, 2 (2007).
Leskovec, J., Huttenlocher, D. & Kleinberg, J. Signed networks in social media. In Proc SIGCHI Conf Hum Factor Comput Syst, 1361–1370 (ACM, 2010).
Erdös, P. & Rényi, A. On random graphs. Pub. Math. Debrecen 6, 290–297 (1959).
Ruths, J. & Ruths, D. Control profiles of complex networks. Science 343, 1373–1376 (2014).
Barabási, A.L. & Albert, R. Emergence of scaling in random networks. Science 286, 509–512 (1999).
Ispolatov, I., Krapivsky, P. & Yuryev, A. Duplicationdivergence model of protein interaction network. Phys. Rev. E 71, 061911 (2005).
Jackson, M. O. & Rogers, B. W. Meeting strangers and friends of friends: How random are social networks? Am. Econ. Rev. 890–915 (2007).
Vázquez, A. Growing network with local rules: Preferential attachment, clustering hierarchy and degree correlations. Phys. Rev. E 67, 056104 (2003).
Caroni, P., Donato, F. & Muller, D. Structural plasticity upon learning: regulation and functions. Nat. Rev. Neurosci. 13, 478–490 (2012).
Li, M. (Ben) PC Toulouse. Variations of the maximum leaf spanning tree problem for bipartite graphs. Info. Proc. Lett. 97, 129–132 (2006).
Dinur, I. & Safra, S. On the hardness of approximating minimum vertex cover. Annl. Math. 439–485 (2005).
Liu, Y.Y., Slotine, J.J. & Barabási, A.L. Observability of complex systems. Proc. Nat. Acad. Sci. 110, 2460–2465 (2013).
Schoone, A. A., Bodlaender, H. L. & Van Leeuwen, J. Diameter increase caused by edge deletion. J. Graph Theory 11, 409–427 (1987).
Pu, C.L., Pei, W.J. & Michaelson, A. Robustness analysis of network controllability. Physica A: Stat. Mech. Appl. 391, 4420–4425 (2012).
Nie, S., Wang, X., Zhang, H., Li, Q. & Wang, B. Robustness of controllability for networks based on edgeattack. PLoS one 9, e89066 (2014).
Parekh, D., Ruths, D. & Ruths, J. Reachabilitybased robustness of network controllability under node and edge attacks. In Tenth Int. Conf. SignalImage Techn. InternetBased Sys. (SITIS), 2014, 424–431 (IEEE, 2014).
Wang, W.X., Ni, X., Lai, Y.C. & Grebogi, C. Optimizing controllability of complex networks by minimum structural perturbations. Phys. Rev. E 85, 026115 (2012).
Sporns, O. The nonrandom brain: efficiency, economy and complex dynamics. Front. Comput. Neurosci. 5 (2011).
Sporns, O. Networks of the Brain (MIT press, 2011).
Bullmore, E. & Sporns, O. Complex brain networks: graph theoretical analysis of structural and functional systems. Nat. Rev. Neurosci. 10, 186–198 (2009).
Muller, L., Destexhe, A. & RudolphLilith, M. Brain networks: smallworlds, after all? New J. Phys. 16, 105004 (2014).
Hilgetag, C. C. & Goulas, A. Is the brain really a smallworld network? Brain Struct and Funct 1–6 (2015).
RudolphLilith, M. & Muller, L. E. Algebraic approach to smallworld network models. Phys. Rev. E 89, 012812 (2014).
Stephan, A. H., Barres, B. A. & Stevens, B. The complement system: an unexpected role in synaptic pruning during development and disease. Ann. Rev. Neurosci. 35, 369–389 (2012).
Lendvai, B., Stern, E. A., Chen, B. & Svoboda, K. Experiencedependent plasticity of dendritic spines in the developing rat barrel cortex in vivo. Nature 404, 876–881 (2000).
O’Leary, D. D. Development of connectional diversity and specificity in the mammalian brain by the pruning of collateral projections. Curr. Op. Neurobiol. 2, 70–77 (1992).
Stam, C., Jones, B., Nolte, G., Breakspear, M. & Scheltens, P. Smallworld networks and functional connectivity in Alzheimer’s disease. Cerebral Cortex 17, 92–99 (2007).
Koffie, R. M., Hyman, B. T. & SpiresJones, T. L. Alzheimer’s disease: synapses gone cold. Mol. Neurodegener. 6, 63–63 (2011).
Acknowledgements
We would like to thank Dr. Stefan Rotter for helpful discussions. We also acknowledge the use of the computing resources provided by the Black Forest Grid Initiative and the bwGRiD (http://www.bwgrid.de), member of the German DGrid initiative, funded by the Ministry for Education and Research and the Ministry for Science, Research and Arts BadenWuerttemberg. The project was funded in part by following funding agencies: Bundesministerium fuer Forschung und Technologie (German Ministry for Research and Technology)  01GQ0830 [to Ad Aertsen and Arvind Kumar]; Deutsche Forschungsgemeinschaft (DFG)  EXC 1086 [to Ad Aertsen and Arvind Kumar]; Simachew Mengiste was partially funded by the EU Erasmus Mundus PhD Program in Neuroinformation (EUROSPIN – EU Erasmus Mundus 159661120091SEEMJD). AK and AA also acknowledge the INTERREG IV Rhin Superieur Program and the European Funds for Regional Development (FEDER) through the project TIGER A31. The article processing charge was funded by the German Research Foundation (DFG) and the University of Freiburg in the funding programme Open Access Publishing.
Author information
Authors and Affiliations
Contributions
A.K., A.A. and S.M. conceived the study. S.M. carried our the network analysis. All authors wrote the manuscript.
Ethics declarations
Competing interests
The authors declare no competing financial interests.
Electronic supplementary material
Rights and permissions
This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/
About this article
Cite this article
Mengiste, S., Aertsen, A. & Kumar, A. Effect of edge pruning on structural controllability and observability of complex networks. Sci Rep 5, 18145 (2015). https://doi.org/10.1038/srep18145
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/srep18145
Further reading

Dilations and degeneracy in network controllability
Scientific Reports (2021)

A route pruning algorithm for an automated geographic location graph construction
Scientific Reports (2021)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.