Research article Special Issues

An improved fixed-time stabilization problem of delayed coupled memristor-based neural networks with pinning control and indefinite derivative approach

  • In this brief, we propose a class of generalized memristor-based neural networks with nonlinear coupling. Based on the set-valued mapping theory, novel Lyapunov indefinite derivative and Memristor theory, the coupled memristor-based neural networks (CMNNs) can achieve fixed-time stabilization (FTS) by designing a proper pinning controller, which randomly controls a small number of neuron nodes. Different from the traditional Lyapunov method, this paper uses the implementation method of indefinite derivative to deal with the non-autonomous neural network system with nonlinear coupling topology between different neurons. The system can obtain stabilization in a fixed time and requires fewer conditions. Moreover, the fixed stable setting time estimation of the system is given through a few conditions, which can eliminate the dependence on the initial value. Finally, we give two numerical examples to verify the correctness of our results.

    Citation: Chao Yang, Juntao Wu, Zhengyang Qiao. An improved fixed-time stabilization problem of delayed coupled memristor-based neural networks with pinning control and indefinite derivative approach[J]. Electronic Research Archive, 2023, 31(5): 2428-2446. doi: 10.3934/era.2023123

    Related Papers:

    [1] Yan Ling Fu, Wei Zhang . Some results on frames by pre-frame operators in Q-Hilbert spaces. AIMS Mathematics, 2023, 8(12): 28878-28896. doi: 10.3934/math.20231480
    [2] Gang Wang . Some properties of weaving K-frames in n-Hilbert space. AIMS Mathematics, 2024, 9(9): 25438-25456. doi: 10.3934/math.20241242
    [3] Sergio Verdú . Relative information spectra with applications to statistical inference. AIMS Mathematics, 2024, 9(12): 35038-35090. doi: 10.3934/math.20241668
    [4] Ligong Wang . Output statistics, equivocation, and state masking. AIMS Mathematics, 2025, 10(6): 13151-13165. doi: 10.3934/math.2025590
    [5] Cure Arenas Jaffeth, Ferrer Sotelo Kandy, Ferrer Villar Osmin . Functions of bounded (2,k)-variation in 2-normed spaces. AIMS Mathematics, 2024, 9(9): 24166-24183. doi: 10.3934/math.20241175
    [6] Chibueze C. Okeke, Abubakar Adamu, Ratthaprom Promkam, Pongsakorn Sunthrayuth . Two-step inertial method for solving split common null point problem with multiple output sets in Hilbert spaces. AIMS Mathematics, 2023, 8(9): 20201-20222. doi: 10.3934/math.20231030
    [7] Osmin Ferrer Villar, Jesús Domínguez Acosta, Edilberto Arroyo Ortiz . Frames associated with an operator in spaces with an indefinite metric. AIMS Mathematics, 2023, 8(7): 15712-15722. doi: 10.3934/math.2023802
    [8] Abdullah Ali H. Ahmadini, Amal S. Hassan, Ahmed N. Zaky, Shokrya S. Alshqaq . Bayesian inference of dynamic cumulative residual entropy from Pareto Ⅱ distribution with application to COVID-19. AIMS Mathematics, 2021, 6(3): 2196-2216. doi: 10.3934/math.2021133
    [9] Messaoud Bounkhel . V-Moreau envelope of nonconvex functions on smooth Banach spaces. AIMS Mathematics, 2024, 9(10): 28589-28610. doi: 10.3934/math.20241387
    [10] Jamilu Adamu, Kanikar Muangchoo, Abbas Ja'afaru Badakaya, Jewaidu Rilwan . On pursuit-evasion differential game problem in a Hilbert space. AIMS Mathematics, 2020, 5(6): 7467-7479. doi: 10.3934/math.2020478
  • In this brief, we propose a class of generalized memristor-based neural networks with nonlinear coupling. Based on the set-valued mapping theory, novel Lyapunov indefinite derivative and Memristor theory, the coupled memristor-based neural networks (CMNNs) can achieve fixed-time stabilization (FTS) by designing a proper pinning controller, which randomly controls a small number of neuron nodes. Different from the traditional Lyapunov method, this paper uses the implementation method of indefinite derivative to deal with the non-autonomous neural network system with nonlinear coupling topology between different neurons. The system can obtain stabilization in a fixed time and requires fewer conditions. Moreover, the fixed stable setting time estimation of the system is given through a few conditions, which can eliminate the dependence on the initial value. Finally, we give two numerical examples to verify the correctness of our results.



    In [13,14,15,16,19], it was proposed that insight into a probability distribution, μ, posed on a Hilbert space, H, could be obtained by finding a best fit Gaussian approximation, ν. This notion of best, or optimal, was with respect to the relative entropy, or Kullback-Leibler divergence:

    R(ν||μ)={Eν[logdνdμ],νμ,+,otherwise. (1.1)

    Having a Gaussian approximation provides qualitative insight into μ, as it provides a concrete notion of the mean and variance of the distribution. Additionally, this optimized distribution can be used in algorithms, such as random walk Metropolis, as a preconditioned proposal distribution to improve performance. Such a strategy can benefit a number of applications, including path space sampling for molecular dynamics and parameter estimation in statistical inverse problems.

    Observe that in the definition of R, (1.1), there is an asymmetry in the arguments. Were we to work with R(μ||ν), our optimal Gaussian would capture the first and second moments of μ, and in some applications this is desirable. However, for a multimodal problem (consider a distribution with two well separated modes), this would be inadequate; our form attempts to match individual modes of the distribution by a Gaussian. For a recent review of the R(ν||μ) problem, see [4], where it is remarked that this choice of arguments is likely to underestimate the dispersion of the distribution of interest, μ. The other ordering of arguments has been explored, in the finite dimensional case, in [2,3,10,18].

    To be of computational use, it is necessary to have an algorithm that will converge to this optimal distribution. In [15], this was accomplished by first expressing ν=N(m,C(p)), where m is the mean and p is a parameter inducing a well defined covariance operator, and then solving the problem,

    (m,p)argminR(N(m,C(p))||μ), (1.2)

    over an admissible set. The optimization step itself was done using the Robbins-Monro algorithm (RM), [17], by seeking a root of the first variation of the relative entropy. While the numerical results of [15] were satisfactory, being consistent with theoretical expectations, no rigorous justification for the application of RM to the examples was given.

    In this work, we emphasize the study and application of RM to potentially infinite dimensional problems. Indeed, following the framework of [15,16], we assume that μ is posed on the Borel σ-algebra of a separable Hilbert space (H,,,). For simplicity, we will leave the covariance operator C fixed, and only optimize over the mean, m. Even in this case, we are seeking mH, a potentially infinite-dimensional space.

    Given the objective function f:HH, assume that it has a root, x. In our application to relative entropy, f will be its first variation. Further, we assume that we can only observe a noisy version of f, F:H×χH, such that for all xH,

    f(x)=E[F(x,Z)]=χF(x,z)μZ(dz), (1.3)

    where μZ is the distribution associated with the random variable (r.v.) Z, taking values in the auxiliary space χ. The naive Robbins-Monro algorithm is given by

    Xn+1=Xnan+1F(Xn,Zn+1), (1.4)

    where ZnμZ, are independent and identically distributed (i.i.d.), and an>0 is a carefully chosen sequence. Subject to assumptions on f, F, and the distribution μZ, it is known that Xn will converge to x almost surely (a.s.), in finite dimensions, [5,6,17]. Often, one needs to assume that f grows at most linearly,

    f(x)c0+c1x, (1.5)

    in order to apply the results in the aforementioned papers. The analysis in the finite dimensional case has been refined tremendously over the years, including an analysis based on continuous dynamical systems. We refer the reader to the books [1,8,11] and references therein.

    As noted, much of the analysis requires the regression function f to have, at most, linear growth. Alternatively, an a priori assumption is sometimes made that the entire sequence generated by (1.4) stays in a bounded set. Both assumptions are limiting, though, in practice, one may find that the algorithms converge.

    One way of overcoming these assumptions, while still ensuring convergence, is to introduce trust regions that the sequence {Xn} is permitted to explore, along with a "truncation" which enforces the constraint. Such truncations distort (1.4) into

    Xn+1=Xnan+1F(Xn,Zn+1)+an+1Pn+1, (1.6)

    where Pn+1 is the projection keeping the sequence {Xn} within the trust region. Projection algorithms are also discussed in [1,8,11].

    We consider RM on a possibly infinite dimensional separable Hilbert space. This is of particular interest as, in the context of relative entropy optimization, we may be seeking a distribution in a Sobolev space associated with a PDE model. A general analysis of RM with truncations in Hilbert spaces can be found in [20]. The main purpose of this work is to adapt the analysis of [12] to the Hilbert space setting for two versions of the truncated problem. The motivation for this is that the analysis of [12] is quite straightforward, and it is instructive to see how it can be easily adapted to the infinite dimensional setting. The key modification in the proof is that results for Banach space valued martingales must be invoked. We also adapt the results to a version of the algorithm where there is prior knowledge on the location of the root. With these results in hand, we can then verify that the relative entropy minimization problem can be solved using RM.

    In some problems, one may have a priori information on the root. For instance, we may know that xU1, some open bounded set. In this version of the truncated algorithm, we have two open bounded sets, U0U1, and xU1. Let σ0=0 and X0U0 be given, then (1.6) can be formulated as

    ˜Xn+1=Xnan+1F(Xn,Zn+1) (1.7a)
    Xn+1={˜Xn+1˜Xn+1U1X(σn)0˜Xn+1U1 (1.7b)
    σn+1={σn˜Xn+1U1σn+1˜Xn+1U1 (1.7c)

    We interpret ˜Xn+1 as the proposed move, which is either accepted or rejected depending on whether or not it will remain in the trust region. If it is rejected, the algorithm restarts at X(σn)0U0. The restart points, {X(σn)0}, may be random, or it may be that X(σn)0=X0 is fixed. The essential property is that the algorithm will restart in the interior of the trust region, away from its boundary. The r.v. σn counts the number of times a truncation has occurred. Algorithm (1.7) can now be expressed as

    Xn+1=Xnan+1F(Xn,Zn+1)+Pn+1Pn+1={X(σn)0˜Xn+1}1˜Xn+1U1. (1.8)

    In the second version of truncated Robbins-Monro, define the sequence of open bounded sets, Un such that:

    U0U1U2,n=0Un=H. (1.9)

    Again, letting X0U0, σ0=0, the algorithm is

    ˜Xn+1=Xnan+1F(Xn,Zn+1) (1.10a)
    Xn+1={˜Xn+1˜Xn+1UσnX(σn)0˜Xn+1Uσn (1.10b)
    σn+1={σn˜Xn+1Uσnσn+1˜Xn+1Uσn (1.10c)

    A consequence of this formulation is that XnUσn for all n. As before, the restart points may be random or fixed, and they are in U0. This would appear superior to the fixed trust region algorithm, as it does not require knowledge of the sets. However, to guarantee convergence, global (in H) assumptions on the regression function are required; see Assumption 2 below. (1.10) can written with Pn+1 as

    Xn+1=Xnan+1F(Xn,Zn+1)+Pn+1Pn+1={X(σn)0˜Xn+1}1˜Xn+1Uσn (1.11)

    In Section 2, we state sufficient assumptions for which we are able to prove convergence in both the fixed and expanding trust region problems, and we also establish some preliminary results. In Section 3, we focus on the relative entropy minimization problem, and identify what assumptions must hold for convergence to be guaranteed. Examples are then presented in Section 4, and we conclude with remarks in Section 5.

    We first reformulate (1.8) and (1.15) in the more general form

    Xn+1=Xnan+1f(Xn)an+1δMn+1=˜Xn+1+an+1Pn+1, (2.1)

    where δMn+1, the noise term, is

    δMn+1=F(Xn,Zn+1)f(Xn)=F(Xn,Zn+1)E[F(Xn,Zn+1)Xn]. (2.2)

    A natural filtration for this problem is Fn=σ(X0,Z1,,Zn). Xn is Fn measurable and the noise term can be expressed in terms of the filtration as δMn+1=F(Xn,Zn+1)E[F(Xn,Zn+1)Fn].

    We now state our main assumptions:

    Assumption 1. f has a zero, x. In the case of the fixed trust region problem, there exist R0<R1 such that

    U0BR0(x)BR1(x)U1.

    In the case of the expanding trust region problem, the open sets are defined as Un=Brn(0) with

    0<r0<r1<r2<<rn. (2.3)

    These sets clearly satisfy (1.9).

    Assumption 2. For any 0<a<A, there exists δ>0:

    infaxxAxx,f(x)δ.

    In the case of the fixed truncation, this inequality is restricted to xU1. This is akin to a convexity condition on a functional F with f=DF.

    Assumption 3. xE[F(x,Z)2] is bounded on bounded sets, with the restriction to U1 in the case of fixed trust regions.

    Assumption 4. an>0, an=, and a2n<

    Theorem 2.1. Under the above assumptions, for the fixed trust region problem, Xnx a.s. and σn is a.s. finite.

    Theorem 2.2. Under the above assumptions, for the expanding trust region problem, Xnx a.s. and σn is a.s. finite.

    Note the distinction between the assumptions in the two algorithms. In the fixed truncation algorithm, Assumptions 2 and 3 need only hold in the set U1, while in the expanding truncation algorithm, they must hold in all of H. While this would seem to be a weaker condition, it requires identification of the sets U0 and U1 for which the assumptions hold. Such sets may not be readily identifiable, as we will see in our examples.

    We first need some additional information about f and the noise sequence δMn.

    Lemma 2.1. Under Assumption 3, f is bounded on U1, for the fixed trust region problem, and on arbitrary bounded sets, for the expanding trust region problem.

    Proof. Trivially,

    f(x)=E[F(x,Z)]E[F(x,Z)]E[F(x,Z)2],

    and the results follows from the assumption.

    Proposition 2.1. For the fixed trust region problem, let

    Mn=ni=1aiδMi.

    Alternatively, in the expanding trust region problem, for r>0, let

    Mn=ni=1aiδMi1Xi1xr.

    Under Assumptions 3 and 4, Mn is a martingale, converging in H, a.s.

    Proof. The following argument holds in both the fixed and expanding trust region problems, with appropriate modifications. We present the expanding trust region case. The proof is broken up into 3 steps:

    1. Relying on Theorem 6 of [7] for Banach space valued martingales, it will be sufficient to show that Mn is a martingale, uniformly bounded in L1(P).

    2. In the case of the expanding truncations,

    E[δMi1Xi1xr2]2E[F(Xi1,Zi)1Xi1xr2]+2E[f(Xi1)1Xi1xr2]2supxxrE[F(x,Z)2]+2supxxrf(x)2

    Since both of these terms are bounded, independently of i, by Assumption 3 and Lemma 1, this is finite.

    3. Next, since {δMi1Xi1xr} is a martingale difference sequence, we can use the above estimate to obtain the uniform L2(P) bound,

    E[Mn2]=ni=1a2iE[δMi1Xi1xr2]supiE[δMi1Xi1xr2]i=1a2i<

    Uniform boundedness in L2, gives boundedness in L1, and this implies a.s. convergence in H.

    In this section we prove results showing that only finitely many truncations will occur, in either the fixed or expanding trust region case. Recall that when a truncation occurs, the equivalent conditions hold: Pn+10; σn+1=σn+1; and ˜Xn+1U1 in the fixed trust region algorithm, while ˜Xn+1Uσn in the expanding trust region case.

    Lemma 2.2. In the fixed trust region algorithm, if Assumptions 1, 2, 3, and 4 hold, then the number of truncations is a.s. finite; a.s., there exists N, such that for all nN, σn=σN.

    Proof. We break the proof up into 7 steps:

    1. Pick ρ and ρ such that

    R0<ρ<ρ<R1 (2.4)

    Let ˉf=supf(x), with the supremum over U1; this bound exists by Lemma 1. Under Assumption 2, there exists δ>0 such that

    infR0/2xxR1xx,f(x)=δ. (2.5)

    Having fixed ρ, ρ, ˉf, and δ, take ϵ>0 such that:

    ϵ<min{ρR0,R1ρ2+ˉf,ρR0ˉf,R02,δ2ˉf,δˉf2,ρρ}. (2.6)

    Having fixed such an ϵ, by the assumptions of this lemma and Proposition 1, a.s., there exists nϵ such that for any n,mnϵ, both

    mk=nakδMkϵ,anϵ. (2.7)

    2. Define the auxiliary sequence

    Xn=Xnk=n+1akδMk. (2.8)

    Using (2.1), we can then write

    Xn+1=Xnan+1f(Xn)+an+1Pn+1. (2.9)

    By (2.7), for any nnϵ,

    XnXnϵ (2.10)

    3. We will show XnBρ(x) for all n large enough. The significance of this is that if nnϵ, and XnBρ(x), then no truncation occurs. Indeed, using (2.6)

    ˜Xn+1xXnx+XnXn+an+1ˉf+an+1δMn+1<ρ+ϵ+ϵˉf+ϵ<R1,˜Xn+1U1. (2.11)

    Consequently, Pn+1=0, Xn+1=˜Xn+1, and σn+1=σn. Thus, establishing XnBρ(x) will yield the result.

    4. Let

    N=inf{nnϵ˜Xn+1U1}+1 (2.12)

    This corresponds to the the first truncation after nϵ. If the above set is empty, for that realization, no truncations occur after nϵ, and we are done. In such a case, we may take N=nϵ in the statement of the lemma.

    5. We now prove by induction that in the case that (2.12) is finite, XnBρ(x) for all nN. First, note that XNBR0(x)Bρ(x). By (2.6) and (2.10),

    XNxXNx+XNXN<R0+ϵ<ρ,XNBρ(x).

    Next, assume XN,XN+1,,Xn are all in Bρ(x). Using (2.11), we have that PN+1==Pn+1=0 and σN==σn=σn+1. Therefore,

    Xn+1x2=Xnx22an+1Xnx,f(Xn)+a2n+1f(Xn)2Xnx22an+1Xnx,f(Xn)+an+1ϵˉf2 (2.13)

    We now consider two cases of (2.13) to conclude Xn+1x<ρ.

    6. In the first case, XnxR0. By Cauchy-Schwarz and (2.6)

    Xn+1x2<R20+2ϵR0ˉf+ϵ2ˉf2=(R0+ϵˉf)2<(ρ)2.

    In the second case, R0<Xnx<ρ. Dissecting the inner product term in (2.13) and using Assumption 2 and (2.10),

    Xnx,f(Xn)=Xnx,f(Xn)+XnXn,f(Xn)Xnx,f(Xn)ˉfϵ (2.14)

    Conditions (2.6) and (2.10) yield the following upper and lower bounds:

    XnxXnxXnXnR0ϵ>12R0,XnxXnx+XnXnρ+ϵ<ρ<R1.

    Therefore, (2.5) applies and Xnx,f(Xn)δ. Using this in (2.14), and condition (2.6),

    Xnx,f(Xn)δˉfϵ>12δ.

    Substituting this last estimate back into (2.13), and using (2.6),

    Xn+1x2<(ρ)2an+1(δϵˉf2)<(ρ)2.

    This completes the inductive step.

    7. Since the auxiliary sequence remains in Bρ(x) for all nN>nϵ, (2.11) ensures ˜Xn+1BR1(x), Pn+1=0, and σn+1=σN, a.s.

    To obtain a similar result for the expanding trust region problem, we first relate the finiteness of the number of truncations with the sequence persisting in a bounded set.

    Lemma 2.3. In the expanding trust region algorithm, if Assumptions 1, 3, and 4 hold, then the sequence remains in a set of the form BR(0) for some R>0 if and only if the number of truncations is finite, a.s.

    Proof. We break this proof into 4 steps:

    1. If the number of truncations is finite, then there exists N such that for all nN, σn=σN. Consequently, the proposed moves are always accepted, and XnUσn=UσN for all nN. Since XnUσnUσN for n<N, XnUσN for all n. By Assumption 3, BR(0)=BrσN(0)=UσN is the desired set.

    2. For the other direction, assume that there exists R>0 such that XnBR(0) for all n. Since the rn in (2.3) tend to infinity, there exists N1, such that R<R+1<rN1. Hence, for all nN1,

    BR(0)BR+1(0)Un (2.15)

    Let ˉf=supf(x), with the supremum over BR(0). Let ˜R be sufficiently large such that BR+1(0)B˜R(x). Lastly, using Proposition 1 and Assumption 4, a.s., there exists N2, such that for all nN2

    anδMn1Xnx˜R<12,an<12(1+ˉf) (2.16)

    Since XnBR(0)B˜R(x), the indicator function in (2.16) is always one, and anδMn<1/2.

    3. Next, let

    N=inf{n0σnmax{N1,N2}} (2.17)

    If the above set is empty, then σn<max{N1,N2} for all n, and the number of truncations is a.s. finite. In this case, the proof is complete.

    4. If the set in (2.17) is not empy, then N<. Take nN. As XnBR(0), and since nσnmax{N1,N2}, (2.16) applies. Therefore,

    ˜Xn+1Xn+˜Xn+1XnXn+an+1f(Xn)+an+1δMn+1<R+12+12<R+1. (2.18)

    Thus, ˜Xn+1BR+1(0)UN1, σnN1, and UN1Uσn. Therefore, ˜Xn+1Uσn. No truncation occurs, and σn=σn+1. Since this holds for all nN, σn=σN, and the number of truncations is a.s. finite.

    Next, we establish that, subject to an additional assumption, the sequence remains in a bounded set; the finiteness of the truncations is then a corollary.

    Lemma 2.4. In the expanding trust region algorithm, if Assumptions 1, 2, 3, and 4 hold, and for any r>0, there a.s. exists N<, such that for all nN,

    Pn+11Xnxr=0,

    then {Xn} remains in a bounded open set, a.s.

    Proof. We break this proof into 7 steps:

    1. We begin by setting some constants for the rest of the proof. Fix R>0 sufficiently large such that BR(x)U0. Next, let ˉf=supf(x) with the supremum taken over BR+2(x). Assumption 2 ensures there exists δ>0 such that

    infR/2xxR+2xx,f(x)=δ. (2.19)

    Having fixed R, ˉf, and δ, take ϵ>0 such that:

    ϵ<min{1,1ˉf,δ2ˉf,δˉf2,R2}. (2.20)

    By the assumptions of this lemma and Proposition 1 there exists, a.s., nϵN such that for all nnϵ,

    i=n+1aiδMi1Xi1xR+2ϵ, (2.21a)
    Pn+11XnxR+2=0, (2.21b)
    an+1ϵ (2.21c)

    2. Define the modified sequence for nnϵ as

    Xn=Xnk=n+1akδMk1Xk1xR+2,XnXnϵ. (2.22)

    Using (2.1), we have the iteration

    Xn+1=Xnan+1δMn+11Xnx>R+2an+1f(Xn)+an+1Pn+1. (2.23)

    3. Let

    N=inf{nnϵσn+1σn}+1, (2.24)

    the first time after nϵ that a truncation occurs.

    If the above set is empty, no truncations occur after nϵ. In this case, σn=σnϵnϵ< for all nnϵ. Therefore, for all nnϵ, XnUσnUσnϵ. Since UσnUσnϵ for all n<nϵ too, the proof is complete in this case.

    4. Now assume that N<. We will show that {Xn} remains in BR+1(x) for all nN. Were this to hold, then for nN,

    XnxXnx+i=n+1aiδMi1Xi1xR+2<R+1+ϵ<R+2, (2.25)

    having used (2.21) and (2.22). For n<N, XnUσnUσN=BrN(0). Therefore, for all n, XnB˜R(0) where ˜R=max{rN,x+R+2}.

    5. We prove XnBR+1(x) by induction. First, since ϵ<1 and XNU0BR(x),

    XNxXNXN+XNx<ϵ+R<R+1.

    Next, assume that XN,XN+1,,Xn are all in BR+1(x). By (2.25), XnBR+2(x). Since Pn+11XnxR+2=0, we conclude Pn+1=0. The modified iteration (2.23) simplifies to have

    Xn+1=Xnan+1f(Xn),

    and

    Xn+1x2=Xnx22an+1Xnx,f(Xn)+a2n+1f(Xn)2<Xnx22an+1Xnx,f(Xn)+an+1ϵˉf2. (2.26)

    6. We now consider two cases of (2.26). First, assume XnxR. Then (2.26) can immediately be bounded as

    Xn+1x2<R2+2ϵRˉf+ϵ2ˉf2=(R+ϵˉf)2<(R+1)2,

    where we have used condition (2.20) in the last inequality.

    7. Now consider the case R<Xnx<R+1. Using (2.20), the inner product in (2.26) can first be bounded from below:

    Xnx,f(Xn)=Xnx,f(Xn)+XnXn,f(Xn)Xnx,f(Xn)ϵˉf>Xnx,f(Xn)12δ.

    Next, using (2.20)

    XnxXnxXnXn>Rϵ>R12R=12R

    Therefore, 12R<Xnx<R+2, so (2.19) ensures Xnx,f(Xn)δ and

    Xnx,f(Xn)>δ12δ=12δ.

    Returning to (2.26), by (2.20),

    Xn+1x2(R+1)2an+1(δϵˉf2)<(R+1)2.

    This completes the proof of the inductive step in this second case, completing the proof.

    Corollary 2.1. For the expanding trust region algorithm, if Assumptions 1, 2, 3, and 4 hold, then the number of truncations is a.s. finite.

    Proof. The proof is by contradiction. We break the proof into 4 steps:

    1. Assuming that there are infinitely many truncations, Lemma 3 implies that the sequence cannot remain in a bounded set. Then, continuing to assume that Assumptions 1, 2, 3, and 4 hold, the only way for the conclusion of Lemma 4 to fail is if the assumption on Pn+11Xnxr is false. Therefore, there exists r>0 and a set of positive measure on which a subsequence, Pnk+11Xnkxr0. Hence XnkBr(x), and Pnk+10. So truncations occur at these indices, and ˜Xnk+1Uσnk.

    2. Let ˉf=supf(x) with the supremum over the set Br(x) and let ϵ>0 satisfy

    ϵ<(ˉf+1)1. (2.27)

    By our assumptions of the lemma and Proposition 1, there exists nϵ such that for all nnϵ

    an+1δMn+11Xnxrϵ,an+1ϵ (2.28)

    Along the subsequence, for all nknϵ,

    ank+1δMnk+11Xnkxr=ank+1δMnk+1ϵ. (2.29)

    3. Furthermore, for nknϵ:

    ˜Xnk+1xXnkx+ank+1f(Xnk)+ank+1δMnk+1<r+ϵˉf+ϵ<r+1,˜Xnk+1Br+1(x), (2.30)

    where (2.27) has been used in the last inequality.

    4. By the definition of the Un, there exists an index M such that UMBr+1(x). Let

    N=inf{nnϵσnM}. (2.31)

    This set is nonempty and N< since we have assumed there are infinitely many truncations. Let nkN. Then σnkM and UσnkBr+1(x). But (2.30) then implies that ˜Xnk+1Uσnk, and no truncation will occur; Pnk+1=0, providing the desired the contradiction.

    Using the above results, we are able to prove Theorems 2.1 and 2.2. Since the proofs are quite similar, we present the more complicated expanding trust region case.

    Proof. We split this proof into 6 steps:

    1. First, by Corollary 1, only finitely many truncations occur. By Lemma 3, there exists R>0 such that XnBR(0) for all n. Consequently, there is an r such that XnBr(x) for all n.

    2. Next, we fix constants. Let ˉf=supf(x) with the supremum taken over Br(x). Fix η(0,2R), and use Assumption 2 to determine δ>0 such that

    infη/2xxrxx,f(x)=δ (2.32)

    Take ϵ>0 such that:

    ϵ<min{1,η2,δ2ˉf,δ2ˉf2} (2.33)

    Having set ϵ, we again appeal to Assumption 4 and Proposition 1 to find nϵ such that for all nnϵ:

    i=n+1aiδMi1Xi1xr=i=n+1aiδMiϵ,an+1ϵ (2.34)

    3. Define the auxiliary sequence,

    Xn=Xni=n+1aiδMi1Xi1xr=Xni=n+1aiδMi. (2.35)

    Since there are only finitely many truncations, there exists Nnϵ, such that for all nN, Pn+1=0, as the truncations have ceased. Consequently, for nN,

    Xn+1=Xnan+1f(Xn) (2.36)

    By (2.34) and (2.35), for nN, XnXnϵ. Since ϵ>0 may be arbitrarily small, it will be sufficient to prove Xnx.

    4. To obtain convergence of Xn, we first examine Xn+1x. For nN,

    Xn+1x2Xnx22an+1Xnx,f(Xn)+an+1ϵˉf2, (2.37)

    Now consider two cases of this expression. First, assume Xnxη. In this case, using (2.33),

    2an+1Xnx,f(Xn)+an+1ϵˉf2an+1(2ηˉf+ϵˉf2)<an+1(4Rˉf+ˉf2)=an+1B. (2.38)

    where B>0 is a constant depending only on R and ˉf. For Xnx>η, using (2.33)

    Xnx,f(Xn)=Xnx,f(Xn)+XnXn,f(Xn)Xnx,f(Xn)ϵˉf>Xnx,f(Xn)12δ. (2.39)

    By (2.33),

    XnxXnxXnXn>ηϵ>12η

    Since Xnx<r too, (2.32) and (2.39) yield the estimate

    Xnx,f(Xn)>δϵˉf>12δ

    Thus, in this regime, using (2.33),

    2an+1Xnx,f(Xn)+an+1ϵˉf2an+1(δϵˉf2)<12δan+1=Aan+1 (2.40)

    where A>0 is a constant depending only on δ.

    Combining estimates (2.38) and (2.40), we can write for nN

    Xn+1x2<Xnx2an+1A1Xnx>η+an+1B1Xnxη. (2.41)

    5. We now show that Xnxη i.o. The argument is by contradiction. Let MN be such that for all nM, Xnx>η. For such n,

    η2<Xn+1x2<Xnx2an+1A<Xn1x2an+1AanA<<XMx2Ani=Mai+1. (2.42)

    Using Assumption 4 and taking n, we obtain a contradiction.

    6. Finally, we prove convergence of Xnx. Since XnBη(x) i.o., let

    N=inf{nNXnx<η}. (2.43)

    For nN, we can then define

    φ(n)=max{pnXpx<η}. (2.44)

    For all such n, φ(n)n, and Xφ(n)Bη(x).

    We claim that for nN,

    Xn+1x2<Xφ(n)x2+Baφ(n)+1<η2+Baφ(n)+1.

    First, if n=φ(n), this trivially holds in (2.41). Suppose now that n>φ(n). Then for i=φ(n)+1,φ(n)+2,n, Xix>η. Consequently,

    Xn+1x2<Xnx2<Xn1x2<<Xφ(n)+1x2<Xφ(n)x2+Baφ(n)+1<η2+Baφ(n)+1

    As φ(n),

    lim supnXn+1x2η2

    Since η may be arbitrarily small, we conclude that

    lim supnXn+1x=limnXn+1x=0,

    completing the proof.

    Recall from the introduction that our distribution of interest, μ, is posed on the Borel subsets of Hilbert space H. We assume that μμ0, where μ0=N(m0,C0) is some reference Gaussian. Thus, we write

    dμdμ0=1Zμexp{Φμ(u)}, (3.1)

    where Φν:XR, X a Banach space, a subspace of H, of full measure with respect to μ0, a Gaussian on H, assumed to be continuous. Zμ=Eμ0[exp{Φ(u)}](0,) is the partition function ensuring we have a probability measure.

    Let ν=N(m,C), be another Gaussian, equivalent to μ0, such that we can write

    dνdμ0=1Zνexp{Φν(v)}, (3.2)

    Assuming that νμ, we can write

    R(ν||μ)=Eν[Φμ(u)Φν(u)]+log(Zμ)log(Zν) (3.3)

    The assumption that νμ implies that ν and μ are equivalent measures. As was proven in [16], if A is a set of Gaussian measures, closed under weak convergence, such that at least one element of A is absolutely continuous with respect to μ, then any minimizing sequence over A will have a weak subsequential limit.

    If we assume, for this work, that C=C0, then, by the Cameron-Martin formula (see [9]),

    Φν(u)=um,mm0H112mm02H1,Zν=1. (3.4)

    Here, ,H1 and H1 are the inner product and norms of the Cameron-Martin Hilbert space, denoted H1,

    f,gH1=C1/20f,C1/20g,f2H1=f,f2H1. (3.5)

    Convergence to the minimizer will be established in H1, and H1 will be the relevant Hilbert space in our application of Theorems 2.1 and 2.2 to this problem.

    Letting ν0=N(0,C0) and vν0, we can then rewrite (3.3) as

    J(m)R(ν||μ)=Eν0[Φμ(v+m)]+12mm02H1+log(Zμ) (3.6)

    The Euler-Lagrange equation associated with (3.6), and the second variation, are:

    J(m)=Eν0[Φμ(v+m)]+C10(mm0), (3.7)
    J(m)=Eν0[Φμ(v+m)]+C10. (3.8)

    In [15], it was suggested that rather than try to find a root of (3.7), the equation first be preconditioned by multiplying by C0,

    C0Eν0[Φμ(v+m)]+(mm0), (3.9)

    and a root of this mapping is sought, instead. Defining

    f(m)=C0Eν0[Φμ(v+m)]+(mm0), (3.10)
    F(m,v)=C0Φμ(v+m)+(mm0). (3.11)

    The Robbins-Monro formulation is then

    mn+1=mnan+1F(mn,vn+1)+Pn+1, (3.12)

    with vnν0, i.i.d.

    We thus have

    Theorem 3.1. Assume:

    There exists ν=N(m,C0)μ0 such that νμ.

    Φμ and exist for all .

    There exists , a local minimizer of , such that .

    The mapping

    (3.13)

    is bounded on bounded subsets of .

    There exists a convex neighborhood of and a constant , such that for all , for all ,

    (3.14)

    Then, choosing according to Assumption 4,

    If the subset can be taken to be all of , for the expanding truncation algorithm, a.s. in .

    If the subset is not all of , then, taking to be a bounded (in ) convex subset of , with , and any subset of such that there exist with

    for the fixed truncation algorithm, a.s. in .

    Proof. We split the proof into 2 steps:

    By the assumptions of the theorem, we clearly satisfy Assumptions 1 and 4. To satisfy Assumption 3, we observe that

    This is bounded on bounded subsets of .

    Per the convexity assumption, (3.14), implies Assumption 2, since, by the mean value theorem in function spaces,

    where is some intermediate point between and . This completes the proof.

    While condition (3.14) is sufficient to obtain convexity, other conditions are possible. For instance, suppose there is a convex open set containing and constant , such that for all ,

    (3.15)

    where is the principal eigenvalue of . Then this would also imply Assumption 2, since

    We mention (3.15) as there may be cases, shown below, for which the operator is obviously nonnegative.

    To apply the Robbins-Monro algorithm to the relative entropy minimization problem, the functional of interest must be examined. In this section we present a few examples, based on those presented in [15], and examine when the assumptions hold. The one outstanding assumption that we must make is that, a priori, is an equivalent measure to .

    Taking , the standard unit Gaussian, let be a smooth function such that

    (4.1)

    is a probability measure on . For these scalar cases, we use in place of . In the above framework,

    and .

    Consider the case that

    (4.2)

    In this case

    Since , all of our assumptions are satisfied and the expanding truncation algorithm will converge to the unique root at a.s. See Figure 1 for an example of the convergence at , , and always restarting at .

    Figure 1.  Robbins-Monro applied to a globally convex scalar problem associated with (4.2) with and expanding trust regions .

    We refer to this as a "globally convex'' problem since is globally convex about the minimizer.

    In contrast to the above problem, some mimizers are only "locally'' convex. Consider the case the double well potential

    (4.3)

    Now, the expressions for RM are

    In this case, vanishes at and , and changes sign from positive to negative when enters . We must therefore restrict to a fixed trust region if we want to ensure convergence to either of .

    We ran the problem at in two cases. In the first case, and the process always restarts at . This guarantees convergence since the second variation will be strictly postive. In the second case, , and the process always restarts at . Now, the second variation can change sign. The results of these two experiments appear in Figure 2. For some random number sequences the algorithm still converged to , even with the poor choice of trust region.

    Figure 2.  Robbins-Monro applied to the nonconvex scalar problem associated with (4.3). Figure (a) shows the result with a well chosen trust region, while (b) shows the outcome of a poorly chosen trust region.

    Take , with

    (4.4)

    equipped with Dirichlet boundary conditions on .* In this case the Cameron-Martin space , the standard Sobolev space equipped with the Dirichlet norm. Let us assume , taking values in .

    * This is the covariance of the standard unit Brownian bridge, .

    Consider the path space distribution on , induced by

    (4.5)

    where is a smooth function. We assume that is such that this probability distribution exists and that , our reference measure.

    We thus seek an valued function for our Gaussian approximation of , satisfying the boundary conditions

    (4.6)

    For simplicity, take , the linear interpolant between . As above, we work in the shifted coordinated .

    Given a path , by the Sobolev embedding, is continuous with its norm controlled by its norm. Also recall that for , in the case of ,

    (4.7)

    Letting be the ground state eigenvalue of ,

    The terms involving in the integrand can be controlled by the norm, which in turn is controlled by the norm, while the terms involving can be integrated according to (4.7). As a mapping applied to , this expression is bounded on bounded subsets of .

    Minimizers will satisfy the ODE

    (4.8)

    With regard to convexity about a minimizer, , if, for instance, were pointwise positive definite, then the problem would satisfy (3.15), ensuring convergence. Consider the quartic potential given by (4.2). In this case,

    (4.9)

    and

    Since , we are guaranteed convergence using expanding trust regions. Taking , and , this is illustrated in Figure 3, where we have also solved (4.8) by ODE methods for comparison. As trust regions, we take

    (4.10)
    Figure 3.  The mean paths computed for (4.9) at different resolutions, along with the truncation sequence.

    and we always restart at the zero solution Figure 3 also shows robustness to discretization; the number of truncations is relatively insensitive to .

    For many problems of interest, we do not have global convexity. Consider the double well potential (4.3), but in the case of paths,

    (4.11)

    Then,

    Here, we take , , and . We have plotted the numerically solved ODE in Figure 4. Also plotted is . Note that is not sign definite, becoming as small as . Since has , (3.15) cannot apply.

    Figure 4.  The numerically computed solution to (4.8) in the case of the double well, (4.11), , and the associated .

    Discretizing the Schrödinger operator

    (4.12)

    we numerically compute the eigenvalues. Plotted in Figure 5, we see that the minimal eigenvalue of is approximately . Therefore,

    (4.13)
    Figure 5.  The numerically computed spectrum for (4.12), associated with the shown in Figure 4. Also shown is the numerically computed spectrum for the path , which introduces negative eigenvalues.

    for all in some neighborhood of . For an appropriately selected fixed trust region, the algorithm will converge.

    However, we can show that the convexity condition is not global. Consider the path , which satisfies the boundary conditions. As shown in Figure 5, this path induces negative eigenvalues.

    Despite this, we are still observe convergence. Using the fixed trust region

    (4.14)

    we obtain the results in Figure 6. Again, the convergence is robust to discretization.

    Figure 6.  The mean paths computed for (4.11) at different resolutions, along with the truncation sequence.

    We have shown that the Robbins-Monro algorithm, with both fixed and expanding trust regions, can be applied to Hilbert space valued problems, adapting the finite dimensional proof of [12]. We have also constructed sufficient conditions for which the relative entropy minimization problem fits within this framework.

    One problem we did not address here was how to identify fixed trust regions. Indeed, that requires a tremendous amount of a priori information that is almost certainly not available. We interpret that result as a local convergence result that gives a theoretical basis for applying the algorithm. In practice, since the root is likely unknown, one might run some numerical experiments to identify a reasonable trust region, or just use expanding trust regions. The practitioner will find that the algorithm converges to a solution, though perhaps not the one originally envisioned. A more sophisticated analysis may address the convergence to a set of roots, while being agnostic as to which zero is found.

    Another problem we did not address was how to optimize not just the mean, but also the covariance in the Gaussian. As discussed in [15], it is necessary to parameterize the covariance in some way, which will be application specific. Thus, while the form of the first variation of relative entropy with respect to the mean, (3.7), is quite generic, the corresponding expression for the covariance will be specific to the covariance parameterization. Additional constraints are also necessary to guarantee that the parameters always induce a covariance operator. We leave such specialization as future work.

    This work was supported by US Department of Energy Award DE-SC0012733. This work was completed under US National Science Foundation Grant DMS-1818716. The authors would like to thank J. Lelong for helpful comments, along with anonymous reviewers whose reports significantly impacted our work.

    The authors declare that there is no conflicts of interest in this paper.



    [1] D. B. Strukov, G. S. Snider, D. R. Stewart, R. S. Williams, The missing memristor found, Nature, 453 (2008), 80–83. https://doi.org/10.1038/nature06932 doi: 10.1038/nature06932
    [2] J. Hopfield, Neural networks and physical systems with emergent collective computational abilities, Proc. Natl. Acad. Sci. U.S.A., 79 (1982), 2554–2558. https://doi.org/10.1073/pnas.79.8.2554 doi: 10.1073/pnas.79.8.2554
    [3] J. Hopfield, Neurons with graded response have collective computational properties like those of two-state neurons, Proc. Natl. Acad. Sci. U.S.A., 81 (1984), 3088–3092. https://doi.org/10.1073/pnas.81.10.3088 doi: 10.1073/pnas.81.10.3088
    [4] Z. Guo, J. Wang, Z. Yan, Passivity and passification of memristor-based recurrent neural networks with time-varying delays, IEEE Trans. Neural Networks Learn. Syst., 25 (2014), 2099–2109. https://doi.org/10.1109/TNNLS.2014.2305440 doi: 10.1109/TNNLS.2014.2305440
    [5] J. Xu, C. Li, X. He, T. Huang, Recurrent neural network for solving model predictive control problem in application of four-tank benchmark, Neurocomputing, 190 (2016), 172–178. https://doi.org/10.1016/j.neucom.2016.01.020 doi: 10.1016/j.neucom.2016.01.020
    [6] W. Mulder, S. Bethard, M. Moens, A survey on the application of recurrent neural networks to statistical language modeling, Comput. Speech Lang., 30 (2015), 61–98. https://doi.org/10.1016/j.csl.2014.09.005 doi: 10.1016/j.csl.2014.09.005
    [7] P. Miao, Y. Shen, Y. Li, L. Bao, Finite-time recurrent neural networks for solving nonlinear optimization problems and their application, Neurocomputing, 177 (2016), 120–129. https://doi.org/10.1016/j.neucom.2015.11.014 doi: 10.1016/j.neucom.2015.11.014
    [8] Z. Cai, L. Huang, L. Zhang, New exponential synchronization criteria for time-varying delayed neural networks with discontinuous activations, Neural Networks, 65 (2015), 105–114. https://doi.org/10.1016/j.neunet.2015.02.001 doi: 10.1016/j.neunet.2015.02.001
    [9] L. Huang, J. Wang, X. Zhou, Existence and global asymptotic stability of periodic solutions for Hopfield neural networks with discontinuous activations, Nonlinear Anal. Real World Appl., 10 (2009), 1651–1661. https://doi.org/10.1016/j.nonrwa.2008.02.022 doi: 10.1016/j.nonrwa.2008.02.022
    [10] X. Li, J. Fang, H. Li, Exponential adaptive synchronization of stochastic memristive chaotic recurrent neural networks with time-varying delays, Neurocomputing, 267 (2017), 396–405. https://doi.org/10.1016/j.neucom.2017.06.049 doi: 10.1016/j.neucom.2017.06.049
    [11] C. Huang, J. Cao, Active control strategy for synchronization and anti-synchronization of a fractional chaotic financial system, Physica A, 473 (2017), 262–275. https://doi.org/10.1016/j.physa.2017.01.009 doi: 10.1016/j.physa.2017.01.009
    [12] S. Yang, Z. Guo, J. Wang, Robust synchronization of multiple memristive neural networks with uncertain parameters via nonlinear coupling, IEEE Trans. Syst. Man Cybern.: Syst., 45 (2015), 1077–1086. https://doi.org/10.1109/TSMC.2014.2388199 doi: 10.1109/TSMC.2014.2388199
    [13] Y. Hong, J. Huang, Y. Xu, On an output finite-time stabilization problem, IEEE Trans. Autom. Control, 2 (2001), 305–309. https://doi.org/10.1109/9.905699 doi: 10.1109/9.905699
    [14] F. Xiao, L. Wang, J. Chen, Y. Gao, Finite-time formation control for muti-agent systems, Automatica, 45 (2009), 2605–2611. https://doi.org/10.1016/j.automatica.2009.07.012 doi: 10.1016/j.automatica.2009.07.012
    [15] Z. Cai, L. Huang, Z. Wang, X. Pan, S. Liu, Periodicity and Multi-periodicity generated by impulses control in delayed Cohen-Grossberg-type neural networks with discontinuous activations, Neural Networks, 143 (2021), 230–245. https://doi.org/10.1016/j.neunet.2021.06.013 doi: 10.1016/j.neunet.2021.06.013
    [16] C. Aouiti, F. Miaadi, Finite-time stabilization of neutral hopfield neural networks with mixed delays, Neural Process. Lett., 48 (2018), 1645–1669. https://doi.org/10.1007/s11063-018-9791-y doi: 10.1007/s11063-018-9791-y
    [17] J. Gao, P. Zhu, A. Alsaedi, F. E. Alsaadi, T. Hayat, A new switching control for finite-time synchronization of memristor-based recurrent neural networks, Neural Networks, 86 (2017), 1–9. https://doi.org/10.1016/j.neunet.2016.10.008 doi: 10.1016/j.neunet.2016.10.008
    [18] Y. Hong, Finite-time stabilization and stabilizability of a class of controllable systems, Syst. Control Lett., 46 (2002), 231–236. https://doi.org/10.1016/S0167-6911(02)00119-6 doi: 10.1016/S0167-6911(02)00119-6
    [19] L. Wang, Y. Shen, G. Zhang, Finite-time stabilization and adaptive control of memristor-based delayed neural networks, IEEE Trans. Neural Networks Learn. Syst., 28 (2017), 2648–2659. https://doi.org/10.1109/TNNLS.2016.2598598 doi: 10.1109/TNNLS.2016.2598598
    [20] M. Tan, W. Tian, Finite-time stabilization and synchronization of complex dynamical networks with nonidentical nodes of different dimensions, Nonlinear Dyn., 79 (2015), 731–741. https://doi.org/10.1007/s11071-014-1699-0 doi: 10.1007/s11071-014-1699-0
    [21] A. Polyakov, D. Efimov, W. Perruquetti, Finite-time and fixed-time stabilization: Implicit Lyapunov function approach, Automatica, 51 (2015), 332–340. https://doi.org/10.1016/j.automatica.2014.10.082 doi: 10.1016/j.automatica.2014.10.082
    [22] A. Polyakov, Nonlinear feedback design for fixed-time stabilization of linear control systems, IEEE Trans. Autom. Control, 57 (2012), 2106–2110. https://doi.org/10.1109/TAC.2011.2179869 doi: 10.1109/TAC.2011.2179869
    [23] Z. Cai, L. Huang, Z. Wang, Novel fixed-time stability criteria for discontinuous nonautonomous systems: Lyapunov method with indefinite derivative, IEEE Trans. Cybern., 52 (2020), 4286–4299. https://doi.org/10.1109/TCYB.2020.3025754 doi: 10.1109/TCYB.2020.3025754
    [24] C. Yang, L. Huang, Z. Cai, Fixed-time synchronization of coupled memristor-based neural networks with time-varying delays, Neural Networks, 116 (2019), 101–109. https://doi.org/10.1016/j.neunet.2019.04.008 doi: 10.1016/j.neunet.2019.04.008
    [25] J. Cao, R. Li, Fixed-time synchronization of delayed memristor-based recurrent neural networks, Sci. China Inf. Sci., 60 (2017), 108–122.
    [26] C. Hu, J. Yu, Z. Chen, H. Jiang, T. Huang, Fixed-time stability of dynamical systems and fixed-time synchronization of coupled discontinuous neural networks, Neural Networks, 89 (2017), 74–83. https://doi.org/10.1016/j.neunet.2017.02.001 doi: 10.1016/j.neunet.2017.02.001
    [27] X. Zhu, X. Yang, F. Alsaadi, T. Hayat, Fixed-time synchronization of coupled discontinuous neural networks with nonidentical perturbations, Neural Process. Lett., 48 (2018), 1161–1174. https://doi.org/10.1007/s11063-017-9770-8 doi: 10.1007/s11063-017-9770-8
    [28] S. Wen, T. Huang, Z. Zeng, Y. Chen, P. Li, Circuit design and exponential stabilization of memristive neural networks, Neural Networks, 63 (2015), 48–56. https://doi.org/10.1016/j.neunet.2014.10.011 doi: 10.1016/j.neunet.2014.10.011
    [29] J. Chen, Y. Wu, Y. Yang, S. Wen, K. Shi, A. Bermak, et al., An efficient Memristor-based circuit implementation of squeeze-and-excitation fully convolutional neural networks, IEEE Trans. Neural Networks Learn. Syst., 33 (2020), 1779–1790. https://doi.org/10.1109/TNNLS.2020.3044047 doi: 10.1109/TNNLS.2020.3044047
    [30] S. Wen, J. Chen, Y. Wu, Z. Yan, Y. Cao, Y. Yang, et al., CKFO: Convolution kernel first operated algorithm with applications in Memristor-based convolutional neural network, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (2020), 1640–1647. https://doi.org/10.1109/TCAD.2020.3019993 doi: 10.1109/TCAD.2020.3019993
    [31] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, D. U. Hwang, Complex networks: structure and dynamics, Phys. Rep., 424 (2006), 175–308. https://doi.org/10.1016/j.physrep.2005.10.009 doi: 10.1016/j.physrep.2005.10.009
    [32] W. Lu, T. Chen, New approach to synchronization analysis of linearly coupled ordinary differential systems, Physica D, 213 (2006), 214–230. https://doi.org/10.1016/j.physd.2005.11.009 doi: 10.1016/j.physd.2005.11.009
    [33] J. Lv, X. Yu, G. Chen, Chaos synchronization of general complex dynamical networks, Physica A, 1334 (2004), 281–302. https://doi.org/10.1016/j.physa.2003.10.052 doi: 10.1016/j.physa.2003.10.052
    [34] H. Liu, B. Wang, J. Lu, Z. Li, Node-set importance and optimization algorithm of nodes selection in complex networks based on pinning control, Acta Phys. Sin., 70 (2021), 056401. https://doi.org/10.7498/aps.70.20200872 doi: 10.7498/aps.70.20200872
    [35] R. Rakkiyappan, B. Kaviarasan, F. Rihan, S. Lakshmanan, Synchronization of singular Markovian jumping complex networks with additive time-varying delays via pinning control, J. Franklin Inst., 352 (2015), 3178–3195. https://doi.org/10.1016/j.jfranklin.2014.12.017 doi: 10.1016/j.jfranklin.2014.12.017
    [36] P. Lin, W. Zhou, J. Fang, D. Li, A novel active pinning control for synchronization andanti-synchronization of new uncertain unified chaoticsystems, Nonlinear Dyn., 62 (2010), 417–425. https://doi.org/10.1007/s11071-010-9728-0 doi: 10.1007/s11071-010-9728-0
    [37] R. Vadivel, P. Hammachukiattikul, Q. Zhu, N. Gunasekaran, Event-triggered synchronization for stochastic delayed neural networks: passivity and passification case, Asian J. Control, (2022), 1–18. https://doi.org/10.1002/asjc.2965 doi: 10.1002/asjc.2965
    [38] R. Vadivel, R. Suresh, P. Hammachukiattikul, B. Unyong, N. Gunasekaran, Event-triggered filtering for network-based neutral systems with time-varying delays via T-S fuzzy approach, IEEE Access, 9 (2021), 145133–145147. https://doi.org/10.1109/ACCESS.2021.3123058 doi: 10.1109/ACCESS.2021.3123058
    [39] R. Vadivel, S. Sabarathinam, Y. Wu, K. Chaisena, N. Gunasekaran, New results on T-S fuzzy sampled-data stabilization for switched chaotic systems with its applications, Chaos, Solitons Fractals, 164 (2022), 112741. https://doi.org/10.1016/j.chaos.2022.112741 doi: 10.1016/j.chaos.2022.112741
    [40] H. Zhang, J. Cheng, H. Zhang, W. Zhang, J. Cao, Quasi-uniform synchronization of Caputo type fractional neural networks with leakage and discrete delays, Chaos, Solitons Fractals, 152 (2021), 111432. https://doi.org/10.1016/j.chaos.2021.111432 doi: 10.1016/j.chaos.2021.111432
    [41] H. Zhang, Y. Cheng, H. Zhang, W. Zhang, J. Cao, Hybrid control design for Mittag-Leffler projective synchronization on FOQVNNs with multiple mixed delays and impulsive effects, Math. Comput. Simul., 197 (2022), 341–357. https://doi.org/10.1016/j.matcom.2022.02.022 doi: 10.1016/j.matcom.2022.02.022
    [42] C. Wang, H. Zhang, I. Stamova, J. Cao, Global synchronization for BAM delayed reaction-diffusion neural networks with fractional partial differential operator, J. Franklin Inst., 360 (2023), 635–656. https://doi.org/10.1016/j.jfranklin.2022.08.038 doi: 10.1016/j.jfranklin.2022.08.038
    [43] T. Andy, Memristor-based neural networks, J. Phys. D: Appl. Phys., 46 (2013), 093001. https://doi.org/10.1088/0022-3727/46/9/093001 doi: 10.1088/0022-3727/46/9/093001
    [44] S. H. Strogatz, I. Stewart, Coupled oscillators and biological synchronization, Sci. Am., 6 (1993), 102–109. https://doi.org/10.1038/scientificamerican1293-102 doi: 10.1038/scientificamerican1293-102
    [45] J. P. Aubin, A. Cellina, Differential Inclusions, (1984), 8–13. https://doi.org/10.1007/978-3-642-69512-4
    [46] J. LaSalle, The Stability of Dynamical Systems, SIAM, 1976.
    [47] A. f. Filippov, Differential Equations with Discontinuous Righthand Sides: Control Systems, Springer Science & Business Media, 18 (2013).
    [48] F. H. Clarke, Optimization and Nonsmooth Analysis, SIAM, 1990. https://doi.org/10.1137/1.9781611971309
    [49] G. H. Hardy, J. E. Littlewood, G. Polya, Inequalities, Cambridge University Press, London, 1952.
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1562) PDF downloads(98) Cited by(0)

Figures and Tables

Figures(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog