Next Article in Journal
Entropy Measurements for Leukocytes’ Surrounding Informativeness Evaluation for Acute Lymphoblastic Leukemia Classification
Next Article in Special Issue
Robustness of Interdependent Networks with Weak Dependency Based on Bond Percolation
Previous Article in Journal
Optimized LightGBM Power Fingerprint Identification Based on Entropy Features
Previous Article in Special Issue
An Internet-Oriented Multilayer Network Model Characterization and Robustness Analysis Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Analysis of the Power Law Feature in Complex Networks

1
School of Mathematical Sciences, University of Electronic Science and Technology of China, Chengdu 611731, China
2
School of Management and Economics, University of Electronic Science and Technology of China, Chengdu 611731, China
3
School of Mathematical Sciences, Dalian University of Technology, Dalian 116024, China
4
Business School, University of Winchester, Winchester SO22 4NR, UK
*
Authors to whom correspondence should be addressed.
Entropy 2022, 24(11), 1561; https://doi.org/10.3390/e24111561
Submission received: 3 October 2022 / Revised: 22 October 2022 / Accepted: 26 October 2022 / Published: 29 October 2022
(This article belongs to the Special Issue Dynamics of Complex Networks)

Abstract

:
Consensus about the universality of the power law feature in complex networks is experiencing widespread challenges. In this paper, we propose a generic theoretical framework in order to examine the power law property. First, we study a class of birth-and-death networks that are more common than BA networks in the real world, and then we calculate their degree distributions; the results show that the tails of their degree distributions exhibit a distinct power law feature. Second, we suggest that in the real world two important factors—network size and node disappearance probability—will affect the analysis of power law characteristics in observation networks. Finally, we suggest that an effective way of detecting the power law property is to observe the asymptotic (limiting) behavior of the degree distribution within its effective intervals.

1. Introduction

In 1999, Barabási and Albert published the seminal article “Emergence of scaling in random networks” in Science [1], in which they suggested that growth and preferential attachment are two key characteristics for real-world networks, and further suggested that networks with the power law feature widely exist in the real world. Over the last 20 years, their contribution has exerted a significant impact on network science research [2,3,4,5].
Generally, a network with the power law feature means that the tail of its degree distribution follows a power law [6,7,8,9,10,11]. In other words, there is a positive integer k , and when k > k , the probability of a node with degree k is:
P ( k ) k α
where α is the exponent of the power law.
For a long time now, researchers and practitioners have believed that the power law feature is common in real-world networks, such as the Internet, scientific co-authoring networks, metabolic networks, and biological networks [12,13,14,15,16,17,18,19,20,21], and numerous results are based on this property (with more than 35,000 citations by Google Scholar). However, more recently, some have begun to question its universality [11,22,23,24,25,26]. For example, Tanaka [22] argues that the metabolite degree distributions at the module level follow an exponential distribution. Similarly, Lima-Mendez and Helden [25] found that the degree distributions in many biological networks are not subject to a power law. More broadly, Stumpf and Porter [11] argue that “most reported power laws lack statistical support and mechanistic backing”. In addition, Broido and Clauset [26], employing statistical tools, analyzed nearly 1000 networks in the social, biological, technological, and informational domains, concluding that scale-free networks are empirically rare. These contradictory and critical studies have shaken the cornerstone of complex network theory, provoking widespread controversy.
Such empirical challenges have spurred researchers to employ alternative or additional criteria to describe the degree distribution, such as low degree saturation, high degree cutoffs, and improved goodness of fit [7,8,21,27,28]. These refinements are thought to provide a better understanding of deviation from the pure power law. Still, some continue to doubt the reliability or validity of empirical data [9,29,30].
Clearly, real-world networks are dynamic—a feature that must be captured in any attempt to explain power law behavior. We suggest that a critical method for informing this debate is to first establish a generic, theoretical, and realistic evolutionary mechanism [11,21,26] in order to examine the power law feature. This theoretical mechanism should include four steps: theoretical model building, degree distribution solving, power law feature judgment, and interpretation of empirical results.
In this paper, we first study a class of birth-and-death networks that are more common than BA networks in the real world, and then we calculate their degree distributions. Our results show that the tails of their degree distributions exhibit a distinct power law feature, providing robust theoretical support for the ubiquity of the power law feature. Second, we suggest that in the real world two important factors—network size and node disappearance probability—point to the existence of the power law feature in the observed networks. As network size reduces, or as the probability of node disappearance increases, the power law feature becomes increasingly difficult to observe. Finally, we suggest that an effective way of detecting the power law property is to observe the asymptotic (limiting) behavior of the degree distribution within its effective intervals.

2. The Power Law Feature Analysis of Complex Networks

2.1. Model

For any network, there are two basic elements: nodes, and edges connecting different nodes. In numerous real-world networks (e.g., social, ecological, business, and biological networks), nodes are agents with life cycles and may possess intelligence. During the evolving processes of these networks, nodes may enter or exit randomly, reflecting the birth and death of network nodes [31,32,33,34]. Meanwhile, these agents (nodes) may exhibit differing capabilities, making them unequal in terms of resources and positions in their networks. Those with scarce resources or occupying critical positions will be more attractive, and new entrants will prefer to establish linkages with nodes that provide what they need. These behaviors make preferential attachment [35,36,37,38,39] widespread in real-world networks, such as the “rich-get-richer” phenomenon [40,41,42,43]. Accordingly, we suggest that random addition/deletion of nodes and preferential attachment are two universal behaviors in the evolution of real-world networks.
Based on the above, we established a network model characterized by random addition and deletion of nodes as well as preferential attachment. The evolving rules are as follows:
(1)
The initial network is a complete graph with m + 1 ( m 1 ) nodes;
(2)
At each unit of time, randomly delete a node from the network with probability q ( 0 q < 1 / 2 ) , or add a new node to the network with probability p = 1 q and connect it with m old nodes of the network by preferential connection. That is, the probability that the new node connects with an old node i depends on the degree k i of node i, i.e., π i = m k i j k j .
Note:
(a)
Considering the real world, any network size has its lower bound n 0 . Here, we assume that n 0 = 1 . This assumption will not affect the power law feature of the model.
(b)
If at time t , a node is deleted, then all the edges incident to the removed node are also removed from the network; thus, the degree of its neighbors decreases by one.
(c)
If at time t , a new node is added to the network and the network size is less than m , then the new node is connected with all old nodes.
In the case of q = 0 , this model equates to the BA model. Thus, the BA model is a special case of our model.

2.2. Steady-State Degree Distribution

Employing the stochastic process rules (SPR) method [44], we obtained the equation of (steady-state) degree distribution K for differing k (see Appendix A for details).
( p + k 2 + k q ) P ( k ) = { q P ( 1 ) k = 0 ( m + 1 ) q P ( m + 1 ) + m 1 2 P ( m     1 ) + p k = m ( k + 1 ) q P ( k + 1 ) + k     1 2 P ( k 1 ) 1 k , k m
where P ( k ) = P { K = k } . When q = 0 , the equations of steady-state degree distribution K are as follows:
{ ( m + 2 ) P ( m ) = 2 ( r + 2 ) P ( r ) = ( r 1 ) P ( r 1 ) r m + 1
Equation (2) also represents the BA model.
By using the probability-generating function, the solutions to the above equations can be obtained First, we need to normalize Equation (1) and then calculate the normalized equations using the probability-generating function. Here, let
Π ( k ) = P ( k ) + β k k = 0 , 1 , 2 ,
where β k = 0 ( k m ) , and for 0 k < m , β k satisfies the following linear equations:
A β = η
where:
A = [ a 0 b 1 0 c 1 a 2 b 3 c 2 a 3 b 4 c m 3 a m 2 b m 1 c m 2 a m 1 c m 1 ] , β = [ β 0 β 1 β 2 β m 3 β m 2 β m 1 ] , η = [ 0 0 0 0 0 p ] m × 1
a i = p + i 2 + i q , b i = i q , c i = i 2 i = 0 , 1 , 2 , 3 ,
so:
β   =   A 1 η
Then, Equation (1) can be written as follows:
{ p Π ( 0 ) = q Π ( 1 ) 3 2 Π ( 1 ) = 2 q Π ( 2 ) + p ^ [ 2 + q ] Π ( 2 ) = 3 q Π ( 3 ) + 1 2 Π ( 1 ) ( p + r 2 + r q ) Π ( r ) = ( r + 1 ) q Π ( r + 1 ) + r 1 2 Π ( r 1 )
where p ^ = 3 2 β 1 2 q β 2 .
To solve Equation (3), we can use the probability-generating function. Let
G ( x ) = k = 0 Π ( k ) x k
Multiplying x k to both sides of the (k + 1)th equation in Equation (3), and adding all of them together, we can get
2 p G ( x ) = G ( x ) ( x 2 ( 1 2 q ) x + 2 q ) + 2 p ^ x
Solving Equation (5), we can get
G ( x ) = ( 1 x 2 q x ) 2 p 1 2 q x 2 q 2 p ^ t ( 1 t ) ( 2 q t ) ( 2 q t 1 t ) 2 p 1 2 q d t
and we may have
G ( x ) = 2 p ^ q p 2 p ^ i = 0 1 2 p 1 2 q + i + 1 ( 2 q x 1 x ) i + 1 = 2 p ^ q p 2 p ^ i = 0 1 2 p 1 2 q + i + 1 ( 1 + 2 q 1 1 x ) i + 1
Employing Taylor expansion for Equation (7), we can get
G ( x ) = 2 p ^ q p 2 p ^ i = 0 + ( 2 q ) i + 1 2 p 1 2 q + i + 1 + 2 p ^ r = 1 + [ i = 1 + 1 2 p 1 2 q + i j = 1 i ( 1 ) j + 1 ( 1 2 q ) j C i j C j + r 1 r ] x r
Comparing with Equation (4), Π ( k ) can be obtained as follows:
Π ( k ) = { 2 p ^ q p 2 p ^ i = 0 + ( 2 q ) i + 1 2 p 1 2 q + i + 1 k = 0 2 p ^ i = 1 + 1 2 p 1 2 q + i j = 1 i ( 1 ) j + 1 ( 1 2 q ) j C i j C j + k 1 k k 1
Then, the solution of Equation (1) is as follows:
P ( k ) = { 2 p ^ q p 2 p ^ i = 0 + ( 2 q ) i + 1 2 p 1 2 q + i + 1 β 0 k = 0 2 p ^ [ i = 1 + 1 2 p 1 2 q + i j = 1 i ( 1 ) j + 1 ( 1 2 q ) j C i j C j + k 1 k ] β r 1 k m 1 2 p ^ [ i = 1 + 1 2 p 1 2 q + i j = 1 i ( 1 ) j + 1 ( 1 2 q ) j C i j C j + k 1 k ] k m
In order to closely observe the property of its tails, Figure 1 illustrates the solution for m = 4 with different values of q .
It is easy to observe that when k > 200 (Figure 1A) and k > 3000 (Figure 1B), the tails approximate to straight lines, implying that the degree distributions of the networks exhibit distinct power law tails. Similar results can be observed with other values of m and q . Therefore, the proposed birth-and-death network model shows the power law feature, providing theoretically robust support for the ubiquity of the power law feature in real-world networks.

2.3. Power Exponent

Meanwhile, this study can also improve our understanding of the power exponent α . According to our model, for sufficiently large k , we have P ( k ) k α , where α can be obtained directly as follows: From Equation (1), for sufficiently large k, we can get
( 2 p + k + 2 k q ) P ( k ) = 2 ( k + 1 ) q P ( k + 1 ) + ( k 1 ) P ( k 1 )
Noticing that P ( k ) 0 , then
2 q [ k P ( k ) ( k + 1 ) P ( k + 1 ) ] P ( k ) = ( k 1 ) P ( k 1 ) k P ( k ) P ( k ) 2 p
Let
P ( k ) λ k α
Taking Equation (13) into Equation (12), and when k + , we can obtain
lim k + 2 q [ k α + 1 ( k + 1 ) α + 1 ] k α = lim k + ( k 1 ) α + 1 k α + 1 k α 2 p
That is:
2 q ( α + 1 ) = α + 1 + 2 p
Hence:
α = 3 4 q 1 2 q
Since α is monotonically decreasing with q , it is easy to see that α 3 for all 0 q < 1 2 . In particular, if and only if q = 0 , we have α = 3 .
As illustrated in Figure 2, α will change with the node disappearance probability q, explaining why various power law networks have different exponents in the real world. In particular, when q = 0 , our evolving model degenerates into the BA model with α = 3 . Moreover, we may find that α changes very slowly from −3 to −7 as q increases from 0 to 0.4, but drops sharply once q > 0.4 . In contrast with studies that highlight differing values of α resulting from linkage changes or aging [7,8], our findings emphasize the significant impact of q on α and highlight their monotonic (decreasing) relationship.

3. The Analysis of Realistic Results

As we know, the power law describes the statistical characteristics of nodes with large degrees. In general, since the probability of these nodes appearing in a complex network is relatively very small, a tiny sampling error may significantly affect their sampling frequencies, leading to a misjudgment of the power law feature. Our theoretical results further show that as the network size n decreases or the node disappearance probability q increases, the power law property becomes increasingly difficult to observe in real-world networks.
For any empirical study, network data are critical for observing the power law feature of a network. Generally speaking, there are two types of data: whole-network data, and sampling data. When the empirical data are whole-network data, the network size n will affect the deviation of its degree distribution tail from the power law tail. Indeed, the power law tail is obtained as n + , meaning that the smaller the network size n, the larger the deviation. As Figure 3 shows, for n = 100 and 500, the tails of the degree distributions deviate greatly from the power law. However, with the increase in n, the tails of the degree distributions show an asymptotic behavior; that is, the range of k subjected to the power law feature gradually becomes wider with the growth of n. From Figure 3, we can see that as n grows from 2000 to 10,000, the range of k that follows the power law property also increases from 10 k 100 to 10 k 200 . Compared with the high degree cutoffs [21,22,23,24,25,26,27,28], this asymptotic behavior provides a dynamic lens for observing the power law characteristics of real-world networks.
When the empirical data are obtained by sampling, in addition to the impact of network size n , the node disappearance probability q will also affect the effective interval for detecting power law characteristics. Commonly, in these empirical studies, frequency f k is used as a proxy for P ( k ) , and for any sampling data there is a sampling error Δ , satisfying | f k P ( k ) | Δ , i.e., 0 f k Δ + P ( k ) . As lim k + P ( k ) = 0 , for a fixed q, there exists a specific degree k q , and for any k > k q , P ( k ) 0.1 Δ . Thus, for k > k q , we have 0 f k Δ + P ( k ) Δ , implying that f k cannot be employed as a proxy for P ( k ) . Therefore, the effective interval to observe the power law feature is [ m ,   k q ] . Moreover, with the increase in q, k q gradually decreases, and the effective interval [ m ,   k q ] will be narrower, making the discernment of the power law feature more difficult.
Figure 4 shows the changes in k q with q under different sampling errors. Taking sampling error Δ = 10 7 [1,9,14,27] as an example, for q = 0 , we have k q = 1587 , meaning that the effective interval for detecting the power law feature is [ 4 , 1587 ] . Furthermore, when q 0.4 , we have k q 182 , which contradicts the results of Figure 1, where the power law tails are observed only for k > 200 . Thus we suggest that for q 0.4 , the power law feature is imperceptible, i.e., almost impossible to perceive in an empirical study. It should be noted that for q = 0.4 , we have α = 7 , showing that α is between −7 and −3 for the observed networks. This theoretical result is consistent with empirical findings of α [ 8 , 2 ] in [14,15,16,17,18,19,20,21], which also shows the reliability and validity of our proposed model. Combining the influences of both n and q, we suggest that a practical way to detect the power law property of a real-world network is to observe the asymptotic behavior of the degree distribution within its effective interval [ m , k q ] .

4. Conclusions

We conclude that the power law feature is proven to be universal in theory but difficult to observe in reality. Complex networks in the real world exhibit diverse evolving mechanisms [45,46,47,48,49,50]. Although random addition and deletion of nodes and preferential attachment were used to establish our birth-and-death network model, it is necessary to investigate other evolving rules and examine their limit properties [48,49,50]. Such further studies may help enrich our understanding of the power law mechanism, as well as revealing more nuanced features.

Author Contributions

X.Z. conceived the article’s idea and was responsible for building and solving the model. Z.H. was involving in model explanation and responsible for drafting the manuscript to the final stage. L.Z. was involving in the article structure and model interpretation in real-world networks. L.R.-B. was involved in the manuscript’s structure and responsible for language edition for the final version. S.S. and Y.X. were involved in the degree distribution solving. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (No. 61771004, 61273015).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

According to the stochastic process rules (SPR) method [44], we used ( n , k ) to describe the state of node v, where n is the number of nodes in the network that contains v, and k is the degree of node v. Let N K ( t ) be the state of node v at time t. The stochastic process { N K ( t ) , t 0 } is an inhomogeneous Markov chain, and the state space is E = { ( n , k ) , n 1 , 0 k n 1 } . Let P be the one-step transition probability matrix of { N K ( t ) , t 0 } at time t:
P = ( p ( n 1 , k 1 ) , ( n 2 , k 2 ) )
Using SPR, the one-step transition probability matrix P produces two cases:
  • Add a node and link it to the old nodes by preferential attachment;
    (i)
    The one-step transition probability that ( n , k ) turns to ( n + 1 , m ) or ( n + 1 , n ) is given as follows:
    p ( n , k ) , ( n + 1 , m ) = P { N K ( t + 1 ) = ( n + 1 , m ) | N K ( t ) = ( n , k ) } = p n + 1 , n m + 1 , 0 k < n
    p ( n , k ) , ( n + 1 , n ) = P { N K ( t + 1 ) = ( n + 1 , n ) | N K ( t ) = ( n , k ) } = p n + 1 , n m , 0 k < n
    (ii)
    The one-step transition probability that ( n , k ) turns to ( n + 1 , k + 1 ) is given as follows:
    p ( n , k ) , ( n + 1 , k + 1 ) = P { N K ( t + 1 ) = ( n + 1 , k + 1 ) | N K ( t ) = ( n , k ) } = m k p r P { N K ( t ) = ( n , r ) } ( n + 1 ) i i P { N K ( t ) = ( n , i ) } , n m + 1 , 0 k < n
    p ( n , k ) , ( n + 1 , k + 1 ) = P { N K ( t + 1 ) = ( n + 1 , k + 1 ) | N K ( t ) = ( n , k ) } = n n + 1 p , n m , 0 k < n
    (iii)
    The one-step transition probability that ( n , k ) turns to ( n + 1 , k ) is given as follows:
    p ( n , k ) , ( n + 1 , k ) = P { N K ( t + 1 ) = ( n + 1 , k ) | N K ( t ) = ( n , k ) } = n p n + 1 [ 1 m k r P { N K ( t ) = ( n , r ) } n i i P { N K ( t ) = ( n , i ) } ] , n m + 1 , 0 k < n
  • Delete a node randomly;
    (iv)
    The one-step transition probability that ( n , k ) turns to ( n 1 , k 1 ) is given as follows:
    p ( n , k ) , ( n 1 , k 1 ) = P { N K ( t + 1 ) = ( n 1 , k 1 ) | N K ( t ) = ( n , k ) } = k n 1 q , 1 k < n
    p ( 1 , 0 ) , ( 1 , 0 ) = P { N K ( t + 1 ) = ( 1 , 0 ) | N K ( t ) = ( 1 , 0 ) } = q
    (v)
    The one-step transition probability that ( n , k ) turns to ( n 1 , k ) is given as follows:
    p ( n , k ) , ( n 1 , k ) = P { N K ( t + 1 ) = ( n 1 , k ) | N K ( t ) = ( n , k ) } = n 1 k n 1 q , n 1 k 0 , n 2
Let P ˜ ( t ) = ( p ( n , k ) ( t ) ) be the probability vectors of N K ( t ) , respectively; that is:
p ( n , k ) ( t ) = P { N K ( t ) = ( n , k ) }
and the initial probability vector P ˜ ( 0 ) = ( p ( n , k ) ( 0 ) ) satisfies
p ( m + 1 , m ) ( 0 ) = P { N K ( 0 ) = ( m + 1 , m ) } = 1
We have:
P ˜ ( t + 1 ) = P ˜ ( t ) P
Let K ( t ) be the average degree distribution at time t. Then, we have:
P { K ( t ) = k } = i = k + 1 + P { N K ( t ) = ( i , k ) } = i = k + 1 + P ˜ ( i , k ) ( t )
Thus, the steady-state degree distribution K is given as follows:
P ( k ) = lim t + P { K ( t ) = k } = lim t + i = k + 1 + P { N K ( t ) = ( i , k ) }
Noting that in the case of 0 q < 1 2 ,
lim n + lim t + i P { N K ( t ) = ( n , i ) } = 1
and
lim n + i i P { N K ( t ) = ( n , i ) } = lim t + i i P { N K ( t ) = ( n , i ) } = 2 m p = 2 m ( 1 q )
we can obtain the equations of the steady-state degree distribution K as follows:
{ p P ( 0 ) = q P ( 1 ) ( p + m 2 + m q ) P ( m ) = ( m + 1 ) q P ( m + 1 ) + m 1 2 P ( m 1 ) + p ( p + k 2 + k q ) P ( k ) = ( k + 1 ) q P ( k + 1 ) + k 1 2 P ( k 1 ) 1 k , k m
When q = 0 , the equations of the steady-state degree distribution K are as follows:
{ ( m + 2 ) P ( m ) = 2 ( r + 2 ) P ( r ) = ( r 1 ) P ( r 1 ) r m + 1
Equation (A18) also represents the equations of the BA model.

References

  1. Barabási, A.-L.; Albert, R. Emergence of Scaling in Random Networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Albert, R.; Jeong, H.; Barabási, A.-L. Error and attack tolerance of complex networks. Nature 2000, 406, 378. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Cohen, R.; Erez, K.; Ben-Avraham, D.; Havlin, S. Resilience of the Internet to Random Breakdowns. Phys. Rev. Lett. 2000, 85, 4626–4628. [Google Scholar] [CrossRef] [Green Version]
  4. Pastor-Satorras, R.; Vespignani, A. Epidemic Spreading in Scale-Free Networks. Phys. Rev. Lett. 2001, 86, 3200–3203. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Toroczkai; Zoltán; Bassler, K.E. Network dynamics: Jamming is limited in scale-free systems. Nature 2004, 428, 6984. [Google Scholar] [CrossRef] [PubMed]
  6. Barabási, A.-L.; Albert, R.; Jeong, H. Mean-field theory for scale-free random networks. Phys. A Stat. Mech. Appl. 1999, 272, 173–187. [Google Scholar] [CrossRef] [Green Version]
  7. Krapivsky, P.L.; Redner, S.; Leyvraz, F. Connectivity of Growing Random Networks. Phys. Rev. Lett. 2000, 85, 4629–4632. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Dorogovtsev, S.N.; Mendes, J.F.F.; Samukhin, A.N. Structure of Growing Networks with Preferential Linking. Phys. Rev. Lett. 2000, 85, 4633–4636. [Google Scholar] [CrossRef] [Green Version]
  9. Clauset, A.; Shalizi, C.R.; Newman, M.E.J. Power-Law Distributions in Empirical Data. SIAM Rev. 2009, 51, 661–703. [Google Scholar] [CrossRef] [Green Version]
  10. Sethna, J.P. Entropy, Order Parameters, and Complexity; Oxford Univ. Press: Oxford, UK, 2010. [Google Scholar]
  11. Stumpf, M.P.H.; Porter, M.A. Critical Truths About Power Laws. Science 2012, 335, 665–666. [Google Scholar] [CrossRef]
  12. Redner, S. How popular is your paper? An empirical study of the citation distribution. Eur. Phys. J. B 1998, 4, 131–134. [Google Scholar] [CrossRef]
  13. Albert, R.; Jeong, H.; Barabási, A.-L. Internet Diameter of the World-Wide Web. Nature 1999, 401, 130. [Google Scholar] [CrossRef] [Green Version]
  14. Jeong, H.; Tombor, B.; Albert, R.; Oltvai, Z.N.; Barabasi, A. The large-scale organization of metabolic networks. Nature 2000, 407, 651–654. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  15. Jeong, H.; Mason, S.P.; Barabasi, A.-L.; Oltvai, Z.N. Lethality and centrality in protein networks. Nature 2001, 411, 41. [Google Scholar] [CrossRef] [Green Version]
  16. Ravasz, E.; Somera, A.L.; Mongru, D.A.; Oltvai, Z.N.; Barabasi, A.-L. Hierarchical Organization of Modularity in Metabolic Networks. Science 2002, 297, 1551–1555. [Google Scholar] [CrossRef] [Green Version]
  17. Cooper, C.; Frieze, A.; Vera, J. Random deletion in a scale-free random graph process. Internet Math. 2004, 1, 4. [Google Scholar] [CrossRef] [Green Version]
  18. Song, C.; Havlin, S.; Makse, H.A. Self-similarity of complex networks. Nature 2005, 433, 392–395. [Google Scholar] [CrossRef] [Green Version]
  19. Yu, H.; Braun, P.; Yıldırım, M.A.; Lemmens, I.; Venkatesan, K.; Sahalie, J.; Hirozane-Kishikawa, T.; Gebreab, F.; Li, N.; Simonis, N.; et al. High-Quality Binary Protein Interaction Map of the Yeast Interactome Network. Science 2008, 322, 104–110. [Google Scholar] [CrossRef] [Green Version]
  20. Johnson, N.; Carran, S.; Botner, J.; Fontaine, K.; Laxague, N.; Nuetzel, P.; Turnley, J.; Tivnan, B. Pattern in Escalations in Insurgent and Terrorist Activity. Science 2011, 333, 81–84. [Google Scholar] [CrossRef] [Green Version]
  21. Barabási, A.-L. Network Science; Cambridge University Press: Cambridge, UK, 2016. [Google Scholar]
  22. Tanaka, R. Scale-Rich Metabolic Networks. Phys. Rev. Lett. 2005, 94, 168101. [Google Scholar] [CrossRef]
  23. Khanin, R.; Wit, E. How Scale-Free Are Biological Networks. J. Comput. Biol. 2006, 13, 810–818. [Google Scholar] [CrossRef] [PubMed]
  24. Willinger, W.; Alderson, D.L.; Doyle, J.C. Mathematics and the Internet: A Source of Enormous Confusion and Great Potential. Not. AM. Math. Soc. 2009, 56, 586. [Google Scholar]
  25. Lima-Mendez, G.; Helden, J.V. The powerful law of the power law and other myths in network biology. Mol. BioSyst. 2009, 5, 1482. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  26. Broido, A.D.; Clauset, A. Scale-free networks are rare. Nat. Commun. 2019, 10, 1017. [Google Scholar] [CrossRef] [Green Version]
  27. Eom, Y.-H.; Fortunato, S. Characterizing and Modeling Citation Dynamics. PLoS ONE 2011, 6, e24926. [Google Scholar] [CrossRef] [Green Version]
  28. Ghoshal, G.; Chi, L.; Barabási, A.-L. Uncovering the role of elementary processes in network evolution. Sci. Rep. 2013, 3, 2920. [Google Scholar] [CrossRef] [Green Version]
  29. Stumpf, M.P.H.; Wiuf, C.; May, R.M. Subnets of scale-free networks are not scale-free: Sampling properties of networks. Proc. Natl. Acad. Sci. USA 2005, 102, 4221–4224. [Google Scholar] [CrossRef] [Green Version]
  30. Virkar, Y.; Clauset, A. Power-law distribution in binned empirical data. Ann. Appl. Stat. 2014, 8, 89. [Google Scholar] [CrossRef] [Green Version]
  31. Moore, C.; Ghoshal, G.; Newman, M.E.J. Exact solutions for models of evolving networks with addition and deletion of nodes. Phys. Rev. E 2006, 74, 036121. [Google Scholar] [CrossRef] [Green Version]
  32. Ben-Naim, E.; Krapivsky, P.L. Addition-Deletion Networks. J. Phys. A: Math. Theor. 2007, 40, 8607. [Google Scholar] [CrossRef] [Green Version]
  33. Saldaña, J. Continuum formalism for modeling growing networks with deletion of nodes. Phys. Rev. E 2007, 75, 027102. [Google Scholar] [CrossRef] [PubMed]
  34. Zhang, X.; He, Z.; Rayman-Bacchus, L. Random Birth-and-Death Networks. J. Stat. Phys. 2016, 162, 842–854. [Google Scholar] [CrossRef] [Green Version]
  35. Yule, G. A mathematical theory of evolution based on the conclusions of Dr. J.C. Willis. Philos. Trans. R. Soc. Lond. Ser. B 1925, 213, 21. [Google Scholar]
  36. Luria, S.E.; Delbrück, M. Mutations of bacteria from virus sensitivity to virus resistance. Genetics 1943, 28, 491–511. [Google Scholar] [CrossRef] [PubMed]
  37. Banavar, J.R.; Maritan, A.; Rinaldo, A. Size and form in efficient transportation networks. Nature 1999, 399, 130–132. [Google Scholar] [CrossRef] [PubMed]
  38. Arthur, W.B. Complexity and the Economy. Science 1999, 284, 107. [Google Scholar] [CrossRef] [PubMed]
  39. Sherwood, R.; Bender, A.; Spring, N. DisCarte: A disjunctive Internet cartographer. ACM SIGCOMM Comput. Comm. Rev. 2008, 38, 303. [Google Scholar] [CrossRef]
  40. Merton, R.K. The Matthew effect in science. The reward and communication systems of science are considered. Science 1968, 159, 56–63. [Google Scholar] [CrossRef]
  41. Rossiter, M.W. The Matthew Matilda Effect in Science. Soc. Stud. Sci. 1993, 23, 325–341. [Google Scholar] [CrossRef]
  42. Hillary, F.G.; Rajtmajer, S.M.; Roman, C.A.; Medaglia, J.D.; Slocomb-Dluzen, J.E.; Calhoun, V.D.; Good, D.C.; Wylie, G.R. The Rich Get Richer: Brain Injury Elicits Hyperconnectivity in Core Subnetworks. PLoS ONE 2014, 9, e104021. [Google Scholar] [CrossRef] [Green Version]
  43. Marshall, E. Tax man’s gloomy message: The rich will get richer. Science 2014, 344, 826–827. [Google Scholar] [CrossRef] [PubMed]
  44. Zhang, X.J.; He, Z.S.; He, Z.; Rayman-Bacchus, L. SPR-based Markov chain method for degree distributions of evolving netwoeks. Phys. A 2012, 391, 3350. [Google Scholar] [CrossRef]
  45. Erdős, P.; Rényi, A. On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci. 1960, 5, 17–60. [Google Scholar]
  46. Bollobás, B. Random Graphs; Academic Press: London, UK, 1985. [Google Scholar]
  47. Watts, D.J.; Strogatz, S.H. Collective dynamics of ‘small-world’ networks. Nature 1998, 393, 440–442. [Google Scholar] [CrossRef]
  48. Dorogovtsev, S.N.; Mendes, J.F.F. Evolution of Networks. Adv. Phys. 2002, 51, 1079. [Google Scholar] [CrossRef] [Green Version]
  49. Albert, R.; Barabási, A.-L. Statistical mechanics of complex networks. Rev. Mod. Phys. 2002, 74, 47–97. [Google Scholar] [CrossRef] [Green Version]
  50. Newman, M.E.J. The Structure and Function of Complex Networks. SIAM Rev. 2003, 45, 167–256. [Google Scholar] [CrossRef]
Figure 1. The steady-state degree distribution for m = 4 . (A) 0 q 0.4 ; (B) 0.4 < q < 0.5 .
Figure 1. The steady-state degree distribution for m = 4 . (A) 0 q 0.4 ; (B) 0.4 < q < 0.5 .
Entropy 24 01561 g001
Figure 2. Relationship between the exponent α and the node disappearance probability q.
Figure 2. Relationship between the exponent α and the node disappearance probability q.
Entropy 24 01561 g002
Figure 3. The degree distributions for different network size n under m = 4 and q = 0.2 .
Figure 3. The degree distributions for different network size n under m = 4 and q = 0.2 .
Entropy 24 01561 g003
Figure 4. Relationship between k q and q for different values of Δ (m = 4).
Figure 4. Relationship between k q and q for different values of Δ (m = 4).
Entropy 24 01561 g004
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, X.; He, Z.; Zhang, L.; Rayman-Bacchus, L.; Shen, S.; Xiao, Y. The Analysis of the Power Law Feature in Complex Networks. Entropy 2022, 24, 1561. https://doi.org/10.3390/e24111561

AMA Style

Zhang X, He Z, Zhang L, Rayman-Bacchus L, Shen S, Xiao Y. The Analysis of the Power Law Feature in Complex Networks. Entropy. 2022; 24(11):1561. https://doi.org/10.3390/e24111561

Chicago/Turabian Style

Zhang, Xiaojun, Zheng He, Liwei Zhang, Lez Rayman-Bacchus, Shuhui Shen, and Yue Xiao. 2022. "The Analysis of the Power Law Feature in Complex Networks" Entropy 24, no. 11: 1561. https://doi.org/10.3390/e24111561

APA Style

Zhang, X., He, Z., Zhang, L., Rayman-Bacchus, L., Shen, S., & Xiao, Y. (2022). The Analysis of the Power Law Feature in Complex Networks. Entropy, 24(11), 1561. https://doi.org/10.3390/e24111561

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop