1: \documentclass[twocolumn,showpacs,preprintnumbers,amsmath,amssymb]{revtex4}
2: %\documentclass[preprint,showpacs,preprintnumbers,amsmath,amssymb]{revtex4}
3: %\documentclass[preprintnumbers,amsmath,showpacs,amssymb]{revtex4}
4:
5: \usepackage{dcolumn}
6: \usepackage{bm}
7: \usepackage{epsfig,graphicx}
8: \usepackage{times}
9:
10: \begin{document}
11:
12: \title{Walks on Apollonian networks}
13:
14: \author{Zi-Gang Huang$^{1}$, Xin-Jian Xu$^{2}$, Zhi-Xi Wu$^{1}$, and
15: Ying-Hai Wang$^{1,}$\footnote{For correspondence: yhwang@lzu.edu.cn}}
16: \affiliation{$^{1}$Institute of Theoretical Physics, Lanzhou
17: University, Lanzhou Gansu 730000, China\\
18: $^{2}$Department of Electronic Engineering, City University of
19: Hong Kong, Kowloon, Hong Kong, China}
20:
21: \date{\today}
22: \pacs{89.75.Hc, 05.40.Fb, 89.75.Fb}
23:
24: \begin{abstract}
25: We carry out comparative studies of random walks on deterministic Apollonian networks (DANs) and random Apollonian networks (RANs). We perform computer simulations for the mean first passage time, the average return time, the mean-square displacement, and the network coverage for unrestricted random walk. The diffusions both on DANs and RANs are proved to be sublinear. The search efficiency for walks with various strategies and the influence of the topology of underlying networks on the dynamics of walks are discussed. Contrary to one's intuition, it is shown that the self-avoiding random walk, which has been verified as an optimal strategy for searching on scale-free and small-world networks, is not the best strategy for the DAN in the thermodynamic limit.
26: \end{abstract}
27:
28: \maketitle
29:
30: In the past few years, much attention has been devoted
31: to the characterization and modelling of a wide range of complex
32: systems that can be described as networks
33: \cite{AlbertDease,Dorogovtsev,Newman}. The topological properties
34: of real-world networks have been studied extensively. But an even
35: more intriguing task, and a natural extension of these studies, is
36: to understand how the topological structure of networks affects
37: dynamics taking place on top of them \cite{Strogatz}. Many
38: dynamic processes have been studied on complex networks, such as
39: epidemic spreading \cite {May}, percolation \cite {Callaway}, and
40: synchronization \cite {Barahona} \emph{et al}. These researches
41: show that topologies of networks play a crucial role in determining
42: the system dynamical features.
43:
44: Random walk has been used for modelling various dynamics in
45: physical, biological, and social contexts \cite{Spitzer}. It could
46: also be a mechanism of transport and search on network
47: \cite{Adamic,Guimer,Holme}. Thus, one interesting problem is to
48: study the dynamical behavior of a random walker on networks with
49: different topological properties. Much is known about random walks
50: on both regular and random networks \cite{Barber,Hughes}.
51: Recently, there have also been several studies of random walks on
52: small-world networks (SWNs) \cite{Pandit,Lahtinen,Almaas,Parris}
53: and on scale-free networks (SFNs) \cite{Adamic,Gallos,Noh,Yang}.
54: The impacts of the heterogeneous topological structures of the
55: networks on the nature of the diffusive and relaxation dynamics of
56: the random walk were probed \cite{Adamic,Jespersen,Tadic,Guimer}.
57: Also, finding efficient algorithms for searching on networks with
58: different topological properties is an important issue related to
59: random walks \cite{Adamic,Noh,Yang}.
60:
61: In this paper we investigate walking processes taking place upon
62: the determinist Apollonian network (DAN) \cite{Andrade} and its variation, the
63: random Apollonian network (RAN) \cite{Zhou}. The DAN can be defined
64: based of the ancient problem of filling space with spheres, first
65: tackled by the Greek mathematician Apollonius of Perga \cite{Boyd}.
66: That is, starting with an initial array of touching disks, which have curvilinear-triangle interstices, disks are added inside each existed interstice in the present configuration, such that these disks touch each of the disks bounding the curvilinear triangles. These added disks give rise to three smaller interstices, which will be filled in the next generation. This process is then repeated for successive generations. The DAN is constructed based on this process by considering each disk as a node, and the disks in contact as the corresponding nodes connected. For each new node added to a certain triangle (corresponding to the curvilinear-triangle interstice), the three vertices are linked to, and three new triangles are created in the network, into which nodes will be inserted in the next generation. Different from recursive constructing of the DAN \cite{Andrade}, the RAN starts with a triangle containing three nodes. Then, at each time step, one triangle is randomly selected to add a new node \cite{Zhou}. Both networks are simultaneously scale-free, small-world, Euclidean, and space filling, and have attracted an increasing interest recently \cite{Doye,Andrade_1,Zhang}.
67:
68: We carry out the random walk along the bonds of a given network as
69: follows: (i) There is only one walker on the network at a time;
70: (ii) The random walker is injected onto a randomly chosen node on
71: the network, a new node for each walker. We will call this node
72: the ``origin'' of the walk; (iii) At each discrete time step $t$,
73: the walker will jump to one nearest neighbor of its current node
74: according to one certain strategy; (iv) We average over different
75: random walkers and realizations of the network until the results
76: converge.
77:
78: The walk strategies adopted by the walker include the following:
79: random walk (RW), no-back (NB) walk, no-triangle-loop (NTL) walk,
80: no-quadrangle-loop (NQL) walk, and self-avoiding (SA) random walk.
81: For the RW, the walker may unrestrictedly jump to a neighbor node
82: by randomly taking one of the links. It forgets all information
83: about its past. The NB walk implies that a random walker, if
84: possible, will not return to the node it was situated at the
85: previous step. Similarly, NTL and NQL random walks mean that the
86: walker will try to avoid walking in loops, with three or four
87: edges, respectively, unless there is no other choice. We mention
88: that the NQL walk also includes the NTL, which means it eliminates
89: quadrangle loops as well as triangle loops. Finally, the SA random
90: walk implies that the walker is the smarter. It tries to avoid
91: revisiting the node that it has already visited in a run of the
92: search. Surely, the SA walk also includes the NTL and NQL walks.
93:
94: One can imagine that an unrestricted RW walker may be trapped into
95: high-clustering regions and revisit nodes there for a long time by reason of
96: walking in loops. While a walker adopting other strategies like NB, NTL and NQL
97: can escape from those regions easier, and therefore improve the search
98: efficiency. Thus, different clustering properties of the underlying networks
99: will induce different efficiencies of the above mentioned strategies. In return,
100: the clustering effect of the networks could be reflected by the efficiencies of
101: those search strategies.
102:
103:
104: \begin{figure}
105: \includegraphics[width=8.4cm]{TiiTij}
106:
107: \caption{(Color online) The mean first passage times $\langle{T_{ij}}\rangle$ (upper panels) and the average return time $\langle{T_{ii}}\rangle$ (lower panels), both of which are average over the results of given $k$'s, for DANs (left-hand) and RANs (right-hand). Fitted linear relations of average return time (solid lines) are obtained with a slope of $-1$ for both DANs and RANs.} \label{fig1}
108: \end{figure}
109:
110: In the context of transport and search, the mean first passage
111: time (MFPT) and the average return time (ART) are important
112: characteristics of the random walk. The average return time
113: denoted by $\langle{T_{ii}}\rangle$ is the average time needed for
114: a walker to return to the origin $i$, which is a
115: special case of MFPT from $i$ to $j$ denoted by $\langle{T_{ij}}\rangle$.
116: Noh and Rieger \cite{Noh} have proved that the MFPT is negatively
117: correlated with $K_{j}$, and $\langle{T_{ii}}\rangle$ is determined only
118: by the total number of links and the degree of the node $i$
119: \begin{equation}
120: \langle{T_{ii}}\rangle=\mathcal{N}/K_{i}\label{eq1}
121: \end{equation}
122: with $\mathcal{N}=\sum_{j}{K_{j}}$ $(j=1,\ldots,N)$. Namely, nodes with higher
123: degrees are visited earlier and more frequently, and therefore targets on these
124: nodes are more easily found out than on nodes with smaller degrees. In Fig.
125: \ref{fig1} we depict simulations of the MFPT (the upper panels) and ART
126: (the lower panels) as a function
127: of nodes degree for the DAN and RAN with size $N=9844$. After averaging over
128: the MFPT and ART for a given degree $k$, the linear property of the log-log
129: plot of ART (the lower panels) is in excellent agreement with Eq. (\ref{eq1}), and
130: the negative correlation between MFPT and $k$ are also presented (the upper panels).
131:
132: In the following, we will investigate walking processes on DANs and RANs. The
133: corresponding results on Watts-Strogatz (WS) ($K=3$, $p_{0}=0.1$) \cite{Watts} and Barab\'{a}si-Albert (BA) ($m=m_{0}=3$) \cite{Barabasi} networks are also presented
134: for comparison. Note that, the four networks have the same average degree $\langle{k}\rangle=6$.
135:
136: \begin{figure*}
137: \includegraphics[width=15cm]{t_N}
138: \caption{(Color online) Average search times of various search
139: strategies for RANs (a), DANs (b), BA networks (c), and WS
140: networks (d).} \label{fig2}
141: \end{figure*}
142:
143: Firstly, let us discuss the search efficiency of all the five walk strategies mentioned
144: above for the four networks. We suppose at every step, the walker adopting various strategies only know neighbors of its present node. So if the target is at one neighbor of the present node where the walker stays, this round of search is over. The walks for the five strategies are performed and the search times (see Fig. \ref{fig2}) are averaged over $200$ different couples of initial positions and targets of the walker, and $50$ realizations of the networks. One can find some common properties from Fig. \ref{fig2}. For example, the approximate
145: power-law relations hold for all search processes of RW, NB, NTL, NQL and SA
146: walks. As another example, the RW walk is the most inefficient search strategy
147: for all the four networks. Nevertheless, some obvious differences still exist
148: among them. The search efficiencies of NB, NTL and NQL walks nearly collapse
149: into one only for BA network (see Fig. \ref{fig2} (c), also in Ref. \cite{Yang}).
150: This can be understood by its comparatively smallest clustering coefficient as
151: to the other three networks. In the weak clustering networks, the NB, NTL and
152: NQL walkers, who adopt increasingly strict law to avoid revisit, can not take
153: their advantages and their search efficiencies keep very closely or even
154: collapse into one. Hence, for DANs and RANs, the efficiency-improvement of NTL
155: and NQL walks as to the NB walk reflects the fact that high clustered nodes are
156: popular on them.
157:
158: \begin{table}
159: \caption{\label{tab:table1} The PSP threshold $P_{c}$ and average path length $\langle{L}\rangle$ of the four networks with size $N=9844$.}
160: \begin{ruledtabular}
161: \begin{tabular}{cdddd}
162: & \mbox{DAN}& \mbox{RAN}& \mbox{BA}& \mbox{WS}\\
163: \hline
164: $P_{c}\approx$ & 4/N & 0.03 & 0.3 & 0.63 \\
165: $\langle{L}\rangle$ &4.06(5) &5.40(9) & 4.27(9) & 8.61(9) \\
166: \end{tabular}
167: \end{ruledtabular}
168: \end{table}
169:
170: The SA walk was proved to be generally the most efficient strategy for
171: searching on networks, whose small-world properties were considered to be the
172: reason \cite{Yang}. However, it is counterexample for the DAN (see Fig.
173: \ref{fig2}(b)). The DAN is one of typical regular networks which has
174: deterministic size when the number of the generations is certain
175: \cite{Andrade,Doye}. Its short average length and high clustering coefficient
176: indeed describe a small-world scenario. Fig. \ref{fig2}(b) shows the average
177: search times for DANs with $3$ to $8$ generations, corresponding to network
178: sizes $16$, $43$, $124$, $367$, $1096$, and $3283$, respectively. Contrast to
179: the conclusions in Ref. \cite{Yang}, the SA walk does not reduce the search
180: time and is even more inefficient than the NTL and NQL walks when $N$ is
181: large. We argue that what is important for the improvement of the search
182: efficiency is not taking more strict law to eliminate repeating visits, but
183: considering the factual structure of the networks.
184:
185: \begin{figure}
186: \centerline{\resizebox{8cm}{!}{\includegraphics{MSD9844}}} \caption{Mean-square
187: distance $\langle{R^{2}}\rangle$ as a function of time for DANs, RANs, WS and
188: BA networks with size $N=9844$ and average degree $\langle{k}\rangle=6$ fixed.
189: The dot line with slope $1$ is plotted for comparison.} \label{fig4}
190: \end{figure}
191:
192:
193: \begin{figure}
194: \centerline{\resizebox{10cm}{!}{\includegraphics{Ncover9844}}} \caption{(Color
195: online) Network coverage $N_{cov}$ after $t$ steps on (solid line from top to
196: bottom) BA networks, DANs, RANs and WS networks with $N=9844$ and
197: $\langle{k}\rangle=6$ fixed.} \label{fig5}
198: \end{figure}
199:
200: According to the former analysis of MFPT, we know that the high-degree nodes would be
201: visited early, so as to be avoided by SA walker preferentially. Thus, to some
202: extent the SA search process can be considered as the question of intentional
203: attack \cite{AlbertAttack} or preferential site percolation (PSP) on networks.
204: The intentional attack means the removal of nodes and their incident edges
205: aiming at those greatest degree nodes, and the PSP threshold $P_{c}$ is a
206: measure of how robust the network is against this attack. When the network
207: size is relatively small ($N<10^5$), DANs and RANs are much frailer than SW
208: and SF networks under the intentional attacks (see Table. \ref{tab:table1}
209: for $P_{c}$), because of the crucial importance of the high-degree nodes to
210: the network integrates \cite{Zhou}. When walking on
211: networks, if the walkers strictly avoid visiting these crucial high-degree
212: nodes, they can hardly move from their current part of the network to other
213: parts, as if the network was intentionally attacked and disintegrated into
214: partes. However, as a search strategy, the SA search processes on the original
215: network are not totally the same as the intentional attacks, because SA walker
216: at node $i$ can revisit nodes, including these crucial nodes, although, with
217: probability $1/k_{i}$ only in condition that all the $k_{i}$ neighbors have
218: already been visited. The compulsive revisits insure that the targets in
219: different parts of networks can finally be found. Considering the similarity
220: between SA search and intentional attack or PSP, we can conclude that the SA
221: search strategy, compared with other mentioned strategies, will improve the search
222: efficiency to certain extent for the networks with higher PSP threshold.
223:
224: Next, we will present our simulation results for two quantities, the
225: mean-square displacement and the network coverage (the average number of
226: distinct sites visited). The mean-square displacement
227: $\langle{R}^{2}(t)\rangle$ of a particle diffusing in a given space, which is a
228: measure of the distance $R$ covered by a typical RW walker after performing $t$
229: steps, is one of the most basic quantities in the random walk theory
230: \cite{Almaas,Gallos}. In most cases, this quantity is described by an
231: expression of the form $\langle{R}^{2}(t)\rangle\sim{t^{a}}$. The value of the
232: parameter $a$ classifies the type of diffusion into normal linear diffusion ($a=1$), subdiffusion ($a>1$), or superlinear diffusion ($a<1$). When considering the unrestricted
233: RW walk along the bonds of networks, the maximum value of $a$ can be $2$ \cite{Gallos}.
234: To calculate $\langle{R}^{2}(t)\rangle$ we first, at each time step, find the minimal
235: distance from the current position of the walker to the origin (i.e., the
236: smallest number of steps needed for the walker to reach the origin) using a
237: breadth-first search method. Then we allow the walker to move through the
238: network until $\langle{R}^{2}(t)\rangle$ has saturated. Finally, the results
239: are average over different initial positions of the walkers and realizations of
240: the network. We simulate $\langle{R}^{2}(t)\rangle$ for the DAN, RAN, WS and BA
241: networks with $N=9844$, and report it as a function of time in Fig. \ref{fig4}.
242: One important feature is the fact that $\langle{R}^{2}(t)\rangle$ equilibrates
243: after a few steps to a constant displacement value. This is a simple
244: manifestation of the small diameter of these finite networks. Note also that,
245: because of the differences of the average path length $\langle{L}\rangle$ of these
246: networks (see Table. \ref{tab:table1} for $\langle{L}\rangle$), the plateau values are also different. For the DANs and RANs, one can find that the slope of
247: $\langle{R}^{2}\rangle$ in the early time
248: is small, especially that of RANs. This can be explained as a result of their
249: highly clustering effect which induces the walker initially spends many time
250: exploring the cluster it was created in and thus the distance to the origin
251: increases slowly. After a few steps the walker escapes its initial territory
252: and diffuses around the entire network. From the slope of $\langle{R}^{2}\rangle$,
253: we know that diffusions both on DANs and RANs are sublinear, and diffusions both on BA
254: and WS networks are superlinear. The network coverage denoted by $N_{cov}$ is
255: defined as average number of distinct visited nodes of the RW walker. Results
256: of $N_{cov}$ on the four networks are presented in Fig. \ref{fig5}. The number
257: of steps performed is nearly two orders of magnitude smaller than the size of
258: the networks, in order to decrease finite size effects. The clustering effects
259: of DANs and RANs are reflected by their relatively low coverage compared to BA networks.
260:
261: In summary, we present comparative studies of the dynamics of random walks on
262: deterministic Apollonian networks and random Apollonian networks with other
263: networks. The efficiency of search strategies are
264: simulated and the clustering and short path effects of networks to the dynamics
265: are discussed. It is found that, for the DAN with large size, the best
266: search strategy is no longer the self-avoiding random walk. The importance of
267: the high-degree nodes to the network integrates are suppose to be one reason.
268: Thus the search strategy on networks should be assigned closely based on
269: the topological structure of the underlying networks, including the clustering,
270: the average path length as well as the essentiality of the high-degree nodes. Since
271: search is a problem of extreme importance for so many natural and artificial
272: networks, this finding may be valuable in practicability. Finally, the simulation
273: results of mean-square displacement $\langle{R}^{2}(t)\rangle$ and network
274: coverage $N_{cov}$ also show the influences of the structure of networks to
275: the dynamics of random walks.
276:
277:
278: \begin{references}
279:
280: \bibitem{AlbertDease}
281: R. Albert and A.L. Barab\'{a}si, Rev. Mod. Phys. \textbf{74}, 47
282: (2002).
283:
284: \bibitem{Dorogovtsev}
285: S.N. Dorogovtsev and J.F.F. Mendes, Adv. Phys. \textbf{51}, 1079
286: (2002).
287:
288: \bibitem{Newman}
289: M.E.J. Newman, SIAM Rev. \textbf{45}, 167 (2003).
290:
291: \bibitem{Strogatz}
292: S.H. Strogatz, Nature (London) \textbf{410}, 268 (2001).
293:
294: \bibitem{May}
295: R. Pastor-Satorras and A. Vespignani, Phys. Rev. Lett.
296: \textbf{86}, 3200 (2001); R. Pastor-Satorras and A. Vespignani,
297: Phys. Rev. E \textbf{63}, 066117 (2001); M.E.J. Newman, ibid
298: \textbf{66}, 016128 (2002).
299:
300: \bibitem{Callaway}
301: D.S. Callaway, M.E.J. Newman, S.H. Strogatz, and D.J. Watts, Phys.
302: Rev. Lett. \textbf{85}, 5468 (2000); M.E.J. Newman, S.H. Strogatz,
303: and D.J. Watts, Phys. Rev. E \textbf{64}, 026118 (2001); R. Cohen,
304: D. ben-Avraham, and S. Havlin, ibid \textbf{66}, 036113 (2002).
305:
306: \bibitem{Barahona}
307: M. Barahona and L.M. Pecora, Phys. Rev. Lett. \textbf{89}, 054101
308: (2002); T. Nishikawa, A.E. Motter, Y.-C. Lai, and F.C.
309: Hoppensteadt, ibid \textbf{91}, 014101 (2003); H. Hong, B.J. Kim,
310: M.Y. Choi, and H. Park, Phys. Rev. E \textbf{69}, 067105 (2004).
311:
312: \bibitem{Spitzer}
313: F. Spitzer,
314: \emph{Principles of Random Walk}, 2nd ed. (Springer-Verlag, New York, 1976).
315:
316: \bibitem{Adamic}
317: L.A. Adamic, R.M. Lukose, A.R. Puniyani, and B.A. Huberman, Phys.
318: Rev. E \textbf{64}, 046135 (2001).
319:
320: \bibitem{Guimer}
321: R. Guimer\'{a}, A. D\'{i}az-Guilera, F. Vega-Redondo, A. Cabrales, and A. Arenas,
322: Phys. Rev. Lett. \textbf{89}, 248701 (2002).
323:
324: \bibitem{Holme}
325: P. Holme, Advances in Complex Systems \textbf{6}, 163 (2003).
326:
327: \bibitem{Barber}
328: M.N. Barber and B.W. Ninham,
329: \emph{Random and Restricted Walks} (Gordon and Breach, New York, 1970).
330:
331: \bibitem{Hughes}
332: B.D. Hughes,
333: \emph{Random Walks and Random Environments} (Clarendon, Oxford, 1996), Vols. 1 and 2.
334:
335: \bibitem{Pandit}
336: S.A. Pandit and R.E. Amritkar, Phys. Rev. E \textbf{63}, 041104
337: (2001).
338:
339: \bibitem{Lahtinen}
340: J. Lahtinen, J. Kert¨¦sz, and K. Kaski,
341: Phys. Rev. E \textbf{64}, 057105 (2001).
342:
343: \bibitem{Almaas}
344: E. Almaas, R.V. Kulkarni, and D. Stroud,
345: Phys. Rev. E \textbf{68}, 056105 (2003).
346:
347: \bibitem{Parris}
348: P.E. Parris and V.M. kenkre, Phys. Rev. E \textbf{72}, 056119
349: (2005).
350:
351: \bibitem{Noh}
352: J.D. Noh and H. Rieger, Phys. Rev. Lett \textbf{92}, 118701
353: (2004); Phys. Rev. E \textbf{69}, 036111 (2004); cond-mat/0509564.
354:
355: \bibitem{Gallos}
356: L.K. Gallos, Phys. Rev. E \textbf{70}, 046116 (2004).
357:
358: \bibitem{Yang}
359: S.-J. Yang, Phys. Rev. E {\bf 71}, 016107 (2005).
360:
361: \bibitem{Jespersen}
362: S. Jespersen, I.M. Sokolov, and A. Blumen,
363: Phys. Rev. E \textbf{62}, 4405 (2000);
364:
365: \bibitem{Tadic}
366: B. Tadi\'{c}, Eur. Phys. J. B \textbf{23}, 221 (2001).
367:
368: \bibitem{Andrade}
369: J.S. Andrade, Jr., H.J. Herrmann, R.F.S. Andrade, and L.R. da Silva,
370: Phys. Rev. Lett. \textbf{94}, 018702 (2005)
371:
372: \bibitem{Zhou}
373: T. Zhou, G. Yan, and B.-H. Wang, Phys. Rev. E {\bf 71}, 046141
374: (2005).
375:
376: \bibitem{Boyd}
377: D.W. Boyd, Can. J. Math. \textbf{25}, 303 (1973).
378:
379: \bibitem{Doye}
380: J.P.K. Doye and C.P. Massen, Phys. Rev. E \textbf{71}, 016128
381: (2005).
382:
383: \bibitem{Andrade_1}
384: R.F.S. Andrade and H.J. Herrmann, Phys. Rev. E \textbf{71}, 056131
385: (2005).
386:
387: \bibitem{Zhang}
388: Z. Zhang, L. Rong, and F. Comellas, cond-mat/0502591; Z. Zhang, F.
389: Comellas, G. Fertin, and L. Rong, cond-mat/0503316.
390:
391: \bibitem{Watts}
392: D.J. Watts and S.H. Strogatz, Nature \textbf{393}, 440 (1998).
393:
394: \bibitem{Barabasi}
395: A.-L. Barab\'{a}si and R. Albert, Science \textbf{286}, 509
396: (1999); A.-L. Barab\'{a}si, R. Albert, and H. Jeong, Physica A
397: \textbf{272}, 173 (1999).
398:
399:
400: \bibitem{AlbertAttack}
401: R. Albert, H. Jeong, and A.-L. Barab\'{a}si,
402: Nature (London) \textbf{406}, 378 (2000).
403:
404: \end{references}
405:
406: \end{document}
407: