Next Article in Journal
Universal Gorban’s Entropies: Geometric Case Study
Previous Article in Journal
Noise Sensitivities for an Atom Shuttled by a Moving Optical Lattice via Shortcuts to Adiabaticity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distribution of Node Characteristics in Evolving Tripartite Network

Department of Applied Mathematics and Informatics, Faculty of Economics, University of South Bohemia, 37005 Ceske Budejovice, Czech Republic
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(3), 263; https://doi.org/10.3390/e22030263
Submission received: 22 January 2020 / Revised: 19 February 2020 / Accepted: 19 February 2020 / Published: 25 February 2020
(This article belongs to the Section Complexity)

Abstract

:
Many real-world networks have a natural tripartite structure. Investigating the structure and the behavior of actors in these networks is useful to gain a deeper understanding of their behavior and dynamics. In our paper, we describe an evolving tripartite network using a network model with preferential growth mechanisms and different rules for changing the strength of nodes and the weights of edges. We analyze the characteristics of the strength distribution and behavior of selected nodes and selected actors in this tripartite network. The distributions of these analyzed characteristics follow the power-law under different modeled conditions. Performed simulations have confirmed all these results. Despite its simplicity, the model expresses well the basic properties of the modeled network. It can provide further insights into the behavior of systems with more complex behaviors, such as the multi-actor e-commerce system that we have used as a real basis for the validation of our model.

1. Introduction

Complex network structures can be detected in many systems that can be found in the field like biology, ecology, social sciences, or large information infrastructures. Many empirical findings have uncovered the general occurrence of complex topological structures underlying many of these networks. For example, online systems based on Internet technology have mostly complex arrangement and different relationships between the entities, which affects their properties.
These topological functions of networks prove to be extremely important as they have a strong impact on the characteristics of networks such as robustness or vulnerability [1,2] and others. In various contexts, the development of a complex network topology was considered as an output of a dynamic system with state variables associated with edges and nodes; see [3,4,5]. The dynamics of these actors (nodes and edges) and their connection patterns influence evolution of networks, their structure and processes ongoing on affected networks. However, the macroscopic behavior of these complex systems can often be reproduced using a suitable network model, with very few assumptions about the components themselves, as also shown herein.

1.1. Related Works

Various network models have been formulated in order to describe the network architecture of these systems and to analyze dynamic processes that take place on their structure [6,7,8,9,10,11,12,13,14,15]. One example of such model is a bipartite network. It is widely applied in the modeling of various online platforms, such as online services where users view or purchase products [16,17,18] and listen to music [19], and also in biology [20,21,22], in medical science [23,24], and in other areas [25,26,27,28,29,30]. For example, Saavedra et al. have introduced two mechanisms, specialization and interaction, that lead to the exponential distribution of degrees for both parts of the bipartite network [31]. They found out that bipartite network can effectively characterize the structure of ecological and organizational networks. Further empirical analyses of some models of bipartite networks describing online services [32,33,34,35] have shown that user-level distributions truly follow a shifted power-law, while the distribution of an object’s level always follows the power law. Zhang et al. [36] suggested an evolutionary model of unweighted online bipartite networks. Their theoretical analysis has not only shown that the model can effectively reproduce two different degree distributions but has demonstrated its results on two real data sets, Delicious and CiteULike. The above studies deal with unweighted bipartite networks. However, weighted networks are more appropriate for modeling of online systems. Therefore, Zhang et al. [37] developed this work and proposed a model to describe distribution characteristics for weighted bipartite evolving networks.
Generally, the network system is defined by patterns of different links between agents or various entities. The research on social networks has greatly advanced in understanding how features such as links, paths, position, and other structural parameters determine the possibilities of a group of agents to influence other agents within the network [33]. For example, taking a central position is generally considered to be beneficial because of the relative simplicity of controlling the information distribution and a possibility of influencing other agents. Likewise, the central position can form an information broker who accesses and integrates information through social links [38,39,40].

1.2. Contribution

In this paper, we deal with a situation where intermediaries enter relationships modeled initially by a bipartite network and take a central position between the two parts of this formerly bipartite network. They affect relationships and change the network topology into a tripartite network. Their aim is to take the most significant position within the network and to have benefits from this position [38]. In our paper, we study how this addition of intermediaries will affect the properties of this tripartite network. We not only consider the increasing mechanism in the corresponding sets of nodes, but we also take into consideration the decline in strength of some objects and intermediaries. Then, we study the properties of the studied network, changes in strength of objects and intermediaries over time, and their distribution using the mean field method according to [41]. We performed simulations that confirmed the results of our analysis.
Detailed studies of the structural properties and dynamics of tripartite networks are not widely found in the literature. Most papers are concerned with the problem of a detection of communities in tripartite networks [42,43]. Our work is one of the first to discuss the characteristics and evolution of the tripartite network whereby it builds on the past research on bipartite networks [36,37].
Our research is motivated in real life, in an online business environment. Users can purchase some product directly in a specific e-shop (corresponding model is a bipartite network, see Figure 1a) or they can use an intermediary (price comparison website) to get through this website to some e-shops where they can purchase products (see Figure 1b). A tripartite network can represent relationships in this environment, and the dynamic aspects of this network can be explored. The tripartite network model could be used to study a situation where a traditional political structure with two main parties is questioned by the presence of a new candidate; a detailed analysis of the problem can be found, e.g., in [44].

1.3. Paper Structure

Next paper chapters are structured as follows. Section 2 describes in detail our network model and corresponding mechanisms. In Section 3, we present our experiments, the results of analyses and simulations. Section 4 follows and contains a discussion of the results. Conclusions are introduced in Section 5.

2. The Model

In this section, we propose a model to find out characteristics of a network originally bipartite after inserting new nodes (and edges) between both parties (users and objects) of the original network (see Figure 1a,b). Our model is based on three associated dynamical mechanisms: topological growth, weight dynamics, and nodes strength dynamics:
(i) Growth. Initially, we assume only relationships among users and objects (Figure 1a). Their relationship can be described using a bipartite graph G (U, V and E). We assume the existence of initial sets of nodes U0 and V0 and edges E0. Beginning with these nodes’ seeds, new nodes are being added:
1. At the beginning, a node of a new type, the intermediary r R (R denotes the set of these entities) enters the existing relations between U and V. The original bipartite network becomes tripartite one with edges between sets U and V, U and R, and R and V (see Figure 1b,c).
2. In the next time steps, new nodes v i V , r i R , or u i U are gradually added to the evolving tripartite network. Each new node will be connected to n already existing nodes, with high strength nodes being preferred; i.e., we assume preferential connections [6].
(ii) Dynamics of weights. The weight of each new edge is initially set to ω0, ε0, μ0 (see Figure 1c). Creating this new edge represents changes in network traffic. For the sake of simplicity, we limit ourselves to the case where the introduction of a new edge on node i will trigger only local rearrangements of weights (see Appendix A, Figure 1A). The weights between nodes i and j in the time step t is denoted by ωij(t) (or εij, μij). We suppose that ωij(t) = ωji(t) (or εij = εji , μij = μji), see Figure 1c.
The edges mean the interaction between users and objects (or intermediaries). The weights of edges indicate the amount of usage between users and objects (or intermediaries) in the sets U, V, and R of their respective nodes. We consider not only the mechanism for increasing the weights of the edges in the two relevant sets of nodes, but also the possibility of edges removing if the intermediary service is refused. Initial values of weights may correspond in real case of e-commerce, for example, to the average value of transactions. In our case, these values correspond to the ratio of the number of accomplished transactions to the number of visited objects (e-shops or intermediaries) (see Appendix C).
(iii) Node dynamics. In this paper, we use the node strength that is a generalization of a node degree [45]. Node dynamics is based on the following mechanisms that affect node strength: The strength of some nodes may decrease, or some edges may disappear (e.g., an object v rejects connection to an intermediary r). The strength of node i V (new object) that is added in the time step t is denoted as s i V ( t ) and is defined as s i V ( t ) =   i Υ ( i ) ω i j , where Υ ( i ) denotes a set of the new neighbors of node i [45,46] (also the number of new edges). The initial strength of this node is s i V ( 0 ) = k i ω i , where ki is the number of the neighbors of node i. The same is true for the strength s i U ( t ) of nodes i U (users) and the strength s i R ( t ) of nodes i R (intermediaries).
The strength of a node combines the information about its connectivity and the intensity of the weights of its edges. In the case of electronic business, the strength si of the node i corresponds to the size of the achieved transactions with this node. Another example might be airports network where the strength of the node i corresponds to the total traffic passing through this node, indicating the importance of the airport i. In the case of a scientific collaboration network, strength indicates the number of articles created by a chosen scientist including IF, see, e.g., [47].
However, it should be emphasized that the correlations between mass and topological properties are encoded in statistical relationships between these quantities. In fact, si, which is the sum over all neighbors i, is correlated with its degree ki. In the simplest case of random, uncorrelated masses wij with an average 〈w〉, the strength is s ~ 〈wk. In the presence of a correlation between weights and topology, it is possible to observe more complex behavior with s ~ Akβ with β ≠ 1 or with β = 1 and A ≠ 〈w〉 [48]. We use the term “strength of nodes” rather than “degree of nodes” here. The aim is to give an idea of possible dynamics of nodes and edges that can exist in various context. However, in this paper we focus rather on the mechanisms that drive the development of the entire network. In the following sections, we describe these network evolution mechanisms in detail:

2.1. Growth of the Network

2.1.1. The Addition of a New User

A new user is added in the time t with the probability p1, and the weights are reset locally [37,45]. We assume that this new user establishes a relationship only with an intermediary in this phase. This new user selects an intermediary based on preferential connection (n1 edges are created among this new user and intermediaries):
Π ( s j R ) = s j R ( t ) i R s i R ( t )
We assign an initial strength s j U ( 0 ) to the new user. If this new object node connects to the intermediary (node) j, it triggers variations of the existing weights across the network. We focus on the case where the addition of a new edge with weight ε0 induces the local rearrangements [37,45] of weight between j and its other neighbors i Υ ( j ) according to the rule (see Figure A1 in Appendix A):
ε i j ( t ) = ε 0 + δ 1 ε i j ( t 1 ) s j R ( t 1 ) ,
where ε0 is an initial weight of the new edge and δ1 is a parameter of increasing the weight of relevant existing edges influenced by creation of a new edge from a new user to an intermediary, see also Appendix C.

2.1.2. The Addition of a New Object

A new object is added in the time t with the probability p2, and the weights are reset locally [37,45]. We also assume here that a new object establishes a relationship only with an intermediary in this initial phase (we do not assume the creation of edges between this object and users at this stage). This new object selects an intermediary based on preferential connection (n2 edges are created among new object and intermediaries):
Π ( s j R ) = s j R ( t ) i R s i R ( t ) .
We assign an initial strength s j V ( 0 ) to the new object. If this new object connects to the intermediary j, it triggers variations of the existing weights across the network. We focus on the case where the addition of a new edge with weight µ0 induces the local rearrangements [37,45] of weight between i and its other neighbors i Υ ( j ) according to the rule (see Figure A1 in Appendix A):
μ i j ( t ) = μ 0 + δ 2 μ i j ( t 1 ) s j R ( t 1 ) ,
where μ0 is an initial weight of the new edge and δ2 is a parameter.

2.1.3. The Addition of a New Intermediary

A new intermediary is added in the time step t with the probability p3. The initial strength s i r ( 0 ) is assigned to it. This intermediary will form connections to objects based on the preferential connection (n3 edges are created):
Π ( s j O ) = s j O ( t ) i R s i O ( t ) .
This transaction will affect the weight of the edges through the relationship (a new edge with weight µ0 induces the local rearrangements of weight between i and its other neighbors i Υ ( j ) ):
μ i j ( t ) = μ 0 + δ 3 μ i j ( t 1 ) s j V ( t 1 ) .

2.2. The Changes of Edges’ Weight

At the time step t, a certain number of already existing users selected based on the preferential connection (Equation (7))
Π ( s j U ) = s j U ( t ) i U s i U ( t )
that will connect with nodes already existing in V (objects) or in R (intermediaries) using one of the following mechanisms:
(i) with n4 nodes already existing in V (objects) and with the probability p4 (n4 edges are created) based on the preferential attachment:
Π ( s j V ) = s j V ( t ) i V s i V ( t ) .
This transaction will affect the weight ωij of the edge between the user and objects; we can express this change as follows:
ω i j ( t ) = ω 0 + ω i j ( t 1 ) + δ 4 ω i j ( t 1 ) s j V ( t 1 ) + δ 4 ω i j ( t 1 ) s i U ( t 1 ) ,
where ω0 is an initial weight of the new edge.
(ii) users choose an intermediary with the probability p5 based on the preferential connection (n5 edges are created) according to Equation (1). This transaction will affect the edge weight between a user and an intermediary through the relationship:
ε i j ( t ) = ε 0 + δ 5 ε i j ( t 1 ) s j R ( t 1 ) + δ 5 ε i j ( t 1 ) s i U ( t 1 ) .
where ε0 is the initial weight of the new edge.
At the same time, selected intermediaries will make connection with m existing nodes in V based on the preferential connection according to Equation (8). This transaction will affect the weight of the edges that we express by the equation (we only consider the local shifts of the weight):
μ i j ( t ) = μ 0 + δ μ i j ( t 1 ) s j V ( t 1 ) + δ μ i j ( t 1 ) s i R ( t 1 )

2.3. The Changes of the Strength of Nodes

2.3.1. The Decreasing of the Strength of an Object

At a certain time, the strength of object i will decrease with the probability p6. The relevant object i will be selected by the anti-preferential probability:
P ( s i V ) = 1   s i V ( t ) j V s j V ( t ) μ 0 + t · p 2 1
The decrease of the strength of node i can be formulated [37,45]:
s i V ( t ) = ( 1 γ 1 ) s i V ( t 1 ) .

2.3.2. The Refusal of Intermediary Service

We suppose that large objects can reject with the probability p7 connection to an intermediary j (see example of the real situation in [49]). The probability that refusal will be realized by the node i with the greatest strength s i V can be expressed by Equation (5). The strength of this object i is reduced by the weight value of the edge   μ i j that disappears:
s i V ( t ) = s i V ( t 1 ) μ i j ( t 1 )
This refusal will have an impact on intermediary whose service the object i has used. At the same time, the strength of this intermediary will be reduced by the weight of the respective edge to the intermediary j that no longer exists. This reduction also affects the surroundings of the intermediary j, thus reducing the weight of the node edges k, for which k Υ ( j ) , by the relation:
s j R ( t ) = s j R ( t 1 ) μ i j ( t 1 ) k Υ ( j ) δ μ k j ( t 1 ) s k V ( t 1 )
The decreasing of the strength of an intermediary j with the probability p8 with the anti-preferential probability:
P ( s i R ) = 1   s i R ( t ) j R s j R ( t ) μ 0 + t · p 3 1
If we select node i, then the weight of the edge µij is reduced for all nodes j with which i has a common edge, i.e., for j Υ ( i ) , by the relation:
s i R ( t ) = ( 1 γ 2 ) s i R ( t 1 ) .

3. Simulations and Results

At each time step, one and only one of these described mechanisms is at work, and which one is at work is controlled by its probability parameter pi. These probability parameters are the regulatory parameters that control the increasing number of objects, users, and intermediaries. The parameters ni are the control parameters that control the addition of edges. Other parameters δi and ri are the control parameters that control the increase or decrease of edge weight.
Topology properties of this evolving network can be derived from the strength distributions. The node strengths varying at the time t are intermediate variables to obtain strength probability distributions for objects and intermediaries. In the performed simulations, we investigated the effect of the probability of the choice of an object directly or using intermediary on distribution characteristics of objects and intermediaries. We also analyzed changes of these characteristics in a situation when the strength of some intermediaries was decreasing, or when some objects decided not to refuse the connections to (services of) intermediaries. The results of the analytical solution of these strength distributions are described in the next sections together with simulation results. The procedure for obtaining data for our model validation and their values used in simulations are given in Appendix C and Table A1.

3.1. Analytical Solution

The analytical solution of the object’s strength distribution is described in detail in Appendix A. The change of the strength of objects over time t is given by the equation:
s j V ( t ) n 2 μ 0 ( t t j ) Γ 3
The strength distribution P ( s V ) of objects in dependence on strength s V :
P ( s V ) = H ( s V ) ξ
where Γ 3 , H, and ξ are formulated by Equations (A15), (A20) and (A21), respectively.
The analytical solution of the strength distribution of intermediaries is described in detail in Appendix B. The change of the strength over time t is given by the equation:
s j R ( t ) n 3 μ 0 ( t t j ) Γ 3
The strength distribution P ( s R ) of intermediaries in dependence on strength s R :
P ( s R ) = H ( s R ) ξ
where Γ 3 , resp. H’, and resp. ξ’ are formulated by Equation (A30), resp. (A33), and resp. (A34), respectively.
The scaling exponents Γ 3 and Γ 3 of strength distribution as a function of parameters have been derived by using the rate equation and mean-field method [41] (see Appendix A and Appendix B). The results of analytical solution show that the strength distributions of intermediaries and of objects in our tripartite network follow the power-law distribution.

3.2. Distribution Characteristics and Users’ Choice of Connection to Objects

Figure 2 and Figure 3 show the example of the effect of the way the users use to come to objects on the strength characteristics of chosen objects and intermediaries. Figure 2a shows how the strength of an object that was added at time tj = 2 changes over time. Figure 2b,c shows similarly how the strength of an intermediary, which was also added at time tj = 2, changes over time. A blue line indicates a greater probability that users will come to the objects through an intermediary.
Although the probability values p4 and p5 are quite different in these cases, the impact of the way users come to some objects on the strength of the object and its distribution function is not very significant (under the other fixed values of parameters given in Table A1 in Appendix C, and various p4 and p5). This fact is confirmed in Figure 2a and Figure 3a.
Figure 3b,c show the distribution characteristics of intermediaries for various p4 and p5. Intermediaries added to the system later also have a chance of gaining more strength under given model conditions. The number of intermediaries with great strength is increasing with greater probability p5 as shown in Figure 3c. Great intermediaries can gain a key position throughout the analyzed network.
This result and the course of the distribution characteristics was confirmed by our simulation calculations (red (∗) mark lower p5 and blue (△) mark for higher p5).

3.3. The Effect of Canceling a Connection to Some Intermediary

Figure 4 and Figure 5 show the example of the effect when an object cancels the connection to an intermediary (they refuse to continue in the use of the service of an intermediary). Users must only access this object directly. In the real situation, large e-shops may refuse to use services of some intermediary (certain real situation is described in [49]). This decision may have a well-founded basis, as shown in Figure 3a. There is no big difference between the distribution function of objects that users access more directly (p4 = 0.630, red line) and the distribution function of objects where users access objects rather through an intermediary (p5 = 0.630, blue line). In the previous section, we mentioned that the intermediator function does not have a major influence on the strength of an object, especially a large one, under given conditions. This is also reflected in Figure 4 and Figure 5. Conversely, this decision of some objects can have a significant effect on the intermediary. Their strength distribution characteristics under higher probability of rejection of connection to intermediary (rejection of its services) are shown in Figure 5b,c. It means that in a real situation, an intermediary must attract all objects, especially the big ones.
These conclusions were also confirmed by our simulation calculations. Here, the impact of the cessation of the use of intermediary services by objects was even more evident, especially for intermediaries with high strength, as it is seen in Figure 5b,c (blue triangles). Big objects attract many users who often use intermediaries to access these big objects. If intermediaries lose large objects, they consequently lose many edges. Their strength will decrease.

3.4. Effect of Decreasing the Strength of An Intermediary

Figure 6a–c show the example of the effect of reducing the strength of intermediaries. The strength of intermediaries with low strength continues to decline. This strength reduction process mainly affects new intermediaries at the beginning when they enter the system, and their strength is still low compared to other intermediaries who are already working in the system. This is evident in Figure 6b and in particular in Figure 6c. The results of the simulations confirm these conclusions. The distribution characteristics of intermediaries are more inclined in the case of a non-zero probability of decreasing intermediaries’ strength. In this case, the low-strength intermediaries even tend to disappear (Figure 6c). The decreasing of the strength of intermediators does not affect distribution characteristics of objects (hence no graphs for objects are shown here).

4. Discussion

As part of our work, we conducted a series of simulations and analyses. They demonstrate correlations between structural parameters and the shape of the strength distributions of individual network actors. We found out that the evolving parameters pi, γ1, and γ2 r can be used to control the change in node strength in time step t. The exponents of the scaling ξ and ξ’ (or Γ and Γ’) of strength distribution as a function of parameters were derived using the speed equation and middle-field methods. We have shown that the strength distribution of intermediaries and objects is governed by the power law distribution. The results of our analysis and simulation also show that different quantities such as strength, degree, and weights are distributed according to power laws with exponents that are not universal and depend on the specific parameters that control the local microscopic weights’ dynamics. This result is in line with the conclusions set out in [39]. It hints to a simple explanation of the lack of any universality observed in real-world networks.
Despite its simplicity, the model captures the basic characteristics of the modeled real network, the results of the numerical simulations correspond to the theoretical analyses. Furthermore, the performed analyses and simulations showed that the distribution characteristics of objects do not differ greatly under the changing conditions (see previous sections). According to these results (Figure 2a, Figure 3a, Figure 4a), it seems that users and objects can function without an intermediary. Especially at the beginning, intermediaries must, in some way, persuade or compel the users to connect them when accessing the objects. In the real case of Internet platforms, intermediaries (e.g., price comparison sites) may offer some services, for example, it is easier to find information, the mediation of additional services, the mediation of trust, etc. In general, Internet intermediaries (e.g., price comparison sites) are important actors as their services create network externalities. The benefits of using their services increase with the expansion. Therefore, building a critical mass of users is a key factor for them.
Simulations also have shown the key position of intermediaries and indicated the dynamics of their position. For example, Figure 4c shows that as the strength of small intermediaries decreases, the number of intermediaries with great strength increase. Small intermediaries can even disappear. However, this may have the effect that the high-strength objects will not want to be fully dependent on intermediaries [49] and may reject the connection with a high-strength intermediary (Figure 5b,c). It may then experience a phenomenon that is referred to in connection with Internet platforms as disintermediation, the declination in the use of intermediaries and efforts to circumvent them [50].
Our analyses and simulations confirm that the key role of the intermediary consists in the possibility to control interactions in respective networks. However, this control derived from “structural holes” is uncertain and the power of the intermediary only gives him “chances of success” depending on the tensions between relationships [51,52].
A typical application of our model may be a real situation where a new entity (an intermediary) enters central position between the two groups of entities. It enters relationships between two entities (which can be modeled by a bipartite network). This intermediary affects existing relationships and changes the network topology. As aforementioned, the motivation for this paper was the situation where a price comparison website enters into the relationships between customers and e-shops in B2C system [53].
Another example where our model can be used is the modeling of the intermediary’s activity in the electricity market [54] or the Pinterest tripartite network [55]. This network consists of users, boards, pins, and relationships. This network can be analyzed as described in this paper. Credit risk sharing in a multi-stakeholder network (insurance companies, banks, firms) [56] can be also modeled by tripartite network. Described approach can be used in modeling of the emergence of a tripartite structure in a policy created, for example, by two main parties and the presence of a new contender [44] as mentioned in Section Introduction. Many examples of relationships with intermediaries can be found in social relationships [57], ecology [58], citation networks [59], economics [60], and others.
In modeling such a network, data acquisition for model validation is an important problem. For our model, we tried to estimate network parameters that would approximate the real data (see Appendix C). In most cases, data can be elicited with the help of interviews with respondents (to reveal social and economic relations) or various forms of exploration or measurement. In most cases, however, only approximate parameters for modeling can be obtained. Accurate measurement of relationships and their evolution is not usually achievable.

5. Conclusions

Complex networks play an essential role in a wide range of disciplines such as social and behavioral sciences, biology, economics, industrial engineering, information technology, and more. By analyzing the structure and behavior of a given network, we can draw useful conclusions when studying various complex systems. In this paper, we use a model of evolving weighted tripartite network with preferential growth mechanisms and different rules for changing the strength of nodes and edge weights. Our goal was to create and to analyze a model of a weighted tripartite network to gain an overview of the role of the single types of nodes (objects and intermediaries). Despite its simplicity, the model captures the essential characteristics of the modeled real network, the distribution of node strength then corresponds to the distribution characteristic of the power law under defined conditions. This weighted tripartite evolving network provides another idea about the behavior of complex systems with more complicated behavior, such as the multi-actor e-commerce system.
In order to create our model more realistic, we are considering further work in the future. First, simulation experiments with different parameter conditions can reveal some more interesting features of modeled complex system based on tripartite network. Secondly, we also want in our future work to refine some parameters expressing the behavior of individual actors in order to model the described system more accurately.

Author Contributions

Conceptualization, L.B.; methodology, L.B.; software, R.R.; formal analysis, L.B.; writing—original draft preparation, L.B.; writing—review and editing, R.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. The Distribution of Strength of Objects

In this section, we derive the distribution of strength of objects. We assume that strength of an i-th object s i V ( t ) is continuous. The corresponding change s i V ( t ) in each step is:
A. The addition of a new object, that joins an intermediary (Figure A1), n1 edges are created with the probability p1:
d s j V ( t ) d t = p 2 n 2 ( μ 0 + i Υ ( j ) δ 2 μ i j ( t ) s i R ( t ) )   Π ( s i R )
We assume that such an addition of a new object will not affect other objects.
B. The addition of a new intermediary that makes connection with n2 objects.
d s j V ( t ) d t = p 3 n 3 ( μ 0 + δ 3 ) Π ( s i V ) .
We assume that the addition of a new intermediary will affect strength of the object that this intermediary join, as well as its surroundings (Figure A1).
C.i. The addition of n3 edges between existing objects and existing users with the probability p3:
d s j V d t = p 4 n 4 ( ω 0 + δ 4 ) Π ( s j U ) + p 4 n 4 j Υ ( i ) δ 4 ω i j ( t ) s i R ( t ) Π ( s i V )
On the right-hand side of Equation (A3), the first element represents an increase of s i V ( t ) , in which the change in edge weight is caused only by the node i in the time step t. The second element denotes an increase of s i V ( t ) caused by a change in the weight of the node j that is a neighbor of node i.
C.ii. The addition of n4 edges between object and intermediary.
d s j V d t = p 5 n 5 m ( μ 0 + δ ) Π ( s j R ) + p 5 n 5 m j Υ ( i ) δ μ i j ( t ) s i R ( t ) Π ( s i V )
Similar equation but between object and intermediary. On the right-hand side of Equation (A4), the first element represents an increase of s i V ( t ) , in which the change in edge weight is caused only by the node i in the time step t. The second element denotes an increase of s i V ( t ) caused by the change of the weight of the node j that is a neighbor of the node i.
Figure A1. Illustration of changes in weight of existing edges after addition of a new edge.
Figure A1. Illustration of changes in weight of existing edges after addition of a new edge.
Entropy 22 00263 g0a1
D. The decrease the strength of the object.
d s i V ( t ) d t = p 6 γ 1 s i V ( t ) Ρ ( s j V )
E. The rejection of the services of an intermediary by objects.
d s i V ( t ) d t = n 7 p 7 ( μ 0 + δ 3 ) Π ( s i V )
In order to get the solution of Equations (A1)–(A7), we will make appropriate adjustments and approximations. In time step t, the total strength of nodes belonging to V (when neglecting the initial edge weight ε 0 and ω 0 , and for t ) is approximately:
j V s j V ( t ) p 2 n 2 ( μ 0 + δ 2 ) t + p 3 n 3 ( μ 0 + δ 3 ) t + p 4 n 4 ( ω 0 + 2 δ 4 ) t + p 5 n 5 m ( μ 0 + 2 δ ) t p 7 n 7 ( μ 0 + δ 3 ) p 6 γ 1 l = 1 t s l V ( l )
where s l V ( l ) is the node strength that goes down in time step l. Since the node strength would decrease r times at each time step, we can suppose the strength of this node will fall r times with probability p5 when t . Hereby, we can write the previous equation in approximate form:
j V s j V ( t ) p 2 n 2 ( μ 0 + δ 2 ) t + p 3 n 3 ( μ 0 + δ 3 ) t + p 4 n 4 ( ω 0 + 2 δ 4 ) t + p 5 n 5 m ( μ 0 + 2 δ ) t p 7 n 7 ( μ 0 + δ 3 ) p 6 γ 1 j V s j V ( t )
We simplify this equation and get it in the form:
j V s j V ( t ) p 2 n 2 ( μ 0 + δ 2 ) t + p 3 n 3 ( μ 0 + δ 3 ) t + p 4 n 4 ( ω 0 + 2 δ 4 ) t + p 5 n 5 m ( μ 0 + 2 δ ) t p 7 n 7 ( μ 0 + δ 3 ) 1 + p 6 γ 1
We denote
  Γ 1 = p 2 n 2 ( μ 0 + δ 2 ) + p 3 n 3 ( μ 0 + δ 3 ) + p 4 n 4 ( ω 0 + 2 δ 4 ) + p 5 n 5 ( μ 0 + 2 δ ) p 7 n 7 ( μ 0 + δ 3 ) 1 + p 6 γ 1
where p 6 γ 1 > 0 .
When t , we can write:
j V s j V ( t ) Γ 1 t
Now, we combine Equations (A8) to (A12) into one equation:
d s i V ( t ) d t p 2 n 2 ( μ 0 + δ 2 ) s i V ( t ) Γ 1 t + p 3 n 3 ( μ 0 + δ 3 ) s i V ( t ) Γ 1 t + p 4 n 4 ( ω 0 + 2 δ 4 ) s i V ( t ) Γ 1 t + p 5 n 5 m ( μ 0 + 2 δ ) s i V ( t ) Γ 1 t p 7 n 7 ( μ 0 + δ 3 ) s i V ( t ) Γ 1 t p 6 γ 1 s i V ( t ) p 2 t + p 4 γ 1 s i V ( t ) p 2 2 t 2 + p 4 γ 1 s i V ( t ) p 2 2 t 2
Assuming t , equation (A13) can be simplified:
d s i V ( t ) d t ( p 2 n 2 ( μ 0 + δ 2 ) + p 3 n 3 ( μ 0 + δ 3 ) + p 4 n 4 ( ω 0 + 2 δ 4 ) + p 5 n 5 m ( μ 0 + 2 δ ) p 7 n 7 ( μ 0 + δ 3 ) ) s i V ( t ) Γ 1 t p 6 γ 1 s i V ( t ) p 2 t
The solution of this equation has a form:
s i V ( t ) C · t p 2 n 2 ( μ 0 + δ 2 ) + p 3 n 3 ( μ 0 + δ 3 ) + p 4 n 4 ( ω 0 + 2 δ 4 ) + p 5 n 5 m ( μ 0 + 2 δ ) p 7 n 7 ( μ 0 + δ 3 ) Γ 1 t p 6 γ 1 p 2 t
where Γ 1 > 0 .
We can denote the exponent in this equation as:
Γ 3 = p 2 n 2 ( μ 0 + δ 2 ) + p 3 n 3 ( μ 0 + δ 3 ) + p 4 n 4 ( ω 0 + 2 δ 4 ) + p 5 n 5 m ( μ 0 + 2 δ ) p 7 n 7 ( μ 0 + δ 3 ) Γ 1 p 6 γ 1 p 2
If we assume that we add the node j in time tj, then it holds for its strength s j V = n 2 μ 0 when t → ∞:
s j V ( t ) n 2 μ 0 ( t t j ) Γ 3
To get the node strength distribution, we use the mean-field method described in detail in [41]. Let P(s) denote the strength distribution that measures the strength probability of a node.
P ( s j V ( t ) < s V ) P ( n 2 μ 0 ( t t j ) Γ 3 < s ) = P ( t j > t ( s V n 2 μ 0 ) 1 Γ 3 ) = 1 P ( t j t ( s V n 2 μ 0 ) 1 Γ 3 ) = 1 ( s V n 2 μ 0 ) 1 Γ 3
P ( s V ) = P ( s j V ( t ) < s s V 1 Γ 3 ( n 2 μ 0 ) 1 Γ 3 s 1 Γ 3 1
Thus, it is possible to write
P ( s V ) = H ( s V ) ξ
where
H = 1 Γ 3 ( n 2 μ 0 ) 1 Γ 3
ξ = 1 Γ 3 + 1

Appendix B. The Distribution of Strength of Intermediaries

In this section, we derive the distribution of strength of intermediaries. We assume that the strength of i-th intermediary s i R ( t ) is continuous. The corresponding change in s i R ( t ) for each mechanism is:
A. The addition of a new user that join intermediaries, n1 new edges are created:
d s j R ( t ) d t = p 1 n 1 ( ε 0 + δ 1 ) Π ( s i R )
B. The addition of a new object that join intermediaries, n2 new edges are created:
d s j R ( t ) d t = p 2 n 2 ( μ 0 + δ 2 ) Π ( s i R ) .
C. The addition of a new intermediary:
d s j R ( t ) d t = p 3 n 3 ( μ 0 + i Υ ( j ) δ 3 μ i j ( t ) s i V ( t ) )   Π ( s i V )
D.i. The addition of n4 new edges between existing users and existing intermediaries with the probability p4.
d s j R d t = p 4 n 4 ( ε 0 + δ 4 ) Π ( s j U ) + p 4 n 4 j Υ ( i ) δ 4 ε i j ( t ) s i R ( t ) Π ( s i R )
On the right side of the Equation (A25), the first element represents an increase of s i R ( t ) , in which the change in the weight of the edge is caused only by the node i in the time step t. The second element denotes an increase of s i R ( t ) caused by a change in the weight of the node j that is a neighbor of node i.
D.ii. The addition of n4 new edges between the object and intermediary.
d s j R d t = p 5 n 5 m ( μ 0 + δ ) Π ( s j R ) + p 5 n 5 m j Υ ( i ) δ μ i j ( t ) s i R ( t ) Π ( s i V )
On the right side of the Equation (A25), the first element represents an increase of s i R ( t ) , in which the change in the weight of the edge is caused only by the node i in the time step t. The second element denotes an increase of s i R ( t ) caused by a change in the weight of the node j that is a neighbor of node i (Figure 4b).
E. The rejection of an intermediary service by a certain object
d s i R ( t ) d t = p 7 n 7 ( μ 0 + δ 3 ) j Υ ( i ) δ μ i j ( t ) s i R ( t ) Π ( s i V )
F. Decreasing of the strength of an intermediary
d s i R ( t ) d t = p 8 γ 2 s i R ( t ) Ρ ( s j R )
To solve Equations (A22)–(A28), we use the same procedures as for solving equations of objects (see (A7) to (A18)). We get similar equations:
s j R ( t ) n 2 μ 0 ( t t j ) Γ 3
where
Γ 3 = p 1 n 1 ( ε 0 + δ 1 ) + p 2 n 2 ( μ 0 + δ 2 ) + p 3 n 3 μ 0 + p 4 n 4 ( ε 0 + 2 δ 4 ) + p 5 n 5 m ( μ 0 + 2 δ ) p 7 n 7 ( μ 0 + 2 δ 3 ) Γ 1 p 8 γ 2 p 3
and
Γ 1 = p 1 n 1 ( ε 0 + δ 1 ) + p 2 n 2 ( μ 0 + δ 2 ) + p 3 n 3 μ 0 + p 4 n 4 ( ε 0 + 2 δ 4 ) + p 5 n 5 m ( μ 0 + 2 δ ) p 7 n 7 ( μ 0 + δ 3 ) 1 + p 8 γ 2
where p 8 γ 2 > 0 and Γ 1 > 0 .
We get for distribution s j R :
P ( s R ) = H ( s R ) ξ
where
H = 1 Γ 3 ( n 2 μ 0 ) 1 Γ 3
ξ = 1 Γ 3 + 1

Appendix C. Data for the Model Validation

Our goal was to perform simulations [61] with data that would approach some real tripartite network. Although tripartite networks can be found in social, biology, and information as well as in other areas, the only available way for us to obtain approximate parameter values for our model validation was to conduct a study on the tripartite network that appears in e-commerce. This tripartite network consists of users (users), price comparison sites (intermediaries), and e-shops (objects). Participants of the study were students. They were to write down when they used a price comparison site, or when they went directly to some e-shops. They were supposed to do it for more than two months. To find out the data concerning e-shops, we also addressed 32 e-shops. The questions we asked were about the number of user accesses, directly or through the price comparison websites, and how a price comparison site affects their revenue and more.
We processed the acquired data, and estimated values of the parameters of our model (Table A1). For example, one of the conclusions stated that almost 50% of respondents regularly used price comparison websites for their purchases, and 33% used them irregularly. Altogether 83% of respondents used price comparison websites because it helped them to navigate in the extensive offers of e-shops. From these data, we have estimated p4 and p5. We have proceeded similarly when estimating the values of other parameters. The δi parameters mean how the respective actors on the site interact. For example, δ1 means a parameter for local weight shift if a new e-shop is created. This will also affect existing e-shops. They must somehow react on a new competitor, for example, to adjust the price of the product, of the shipping or to respond in similar way. Based on this research and previous works [62,63,64], we estimated the parameters values as described in Table A1.
Table A1. List of the parameter’s values used for analytical calculations and simulations.
Table A1. List of the parameter’s values used for analytical calculations and simulations.
ParameterAssigned Value
The probabilities of an entity formationp1 = 0.020 the probability of new user formation
p2 = 0.010 the probability of new object formation
p3 = 0.001 the probability of a new intermediary formation
p4 = 0.630 the probability of a creating a new edge between the existing user and an existing object
p5 = 0.309 the probability that users will choose an intermediary which they use to go the object
p6 = 0.005 the probability of decreasing the strength of an object
p7 = 0 probability that the object will refuse to use the service of an intermediary
p8 = 0 the probability of decreasing the strength of an intermediary
The number of newly generated edgesn1 = 2 new user generates n1 edges to intermediaries
n2 = 2 new object generates n2 edges to intermediaries
n3 = 5 new intermediary generates n3 edges from intermediary to object
n4 = 1 n4 existing users will join existing objects
n5 = 1 user choose n5 intermediariesm = number of objects that the user will contact after he the chooses them on this intermediary
n6 = 2 the reduction in the strength of n6 objects
n7 = 1 the number of edges removed after an object will not want further to use services of intermediaries
n8 = 1 the reduction in the strength of n8 intermediaries
The weights of new edgesω0 = 0.3 the weight of a new edge from user to object
μ0 = 0.2 the weight of a new edge from intermediary to object
ε0 = 0.3 the weight of a new edge strength from a user to an intermediary
Local shifts of weight of edgesδ1 = 0.0020 parameter of increasing of weight of relevant existing edges influenced by creation of a new edge from a new user to an intermediary
δ2 = 0.0020 parameter of increasing of weight of relevant existing edges influenced by creation of a new edge from a new object to an intermediary
δ3 = 0.0010 parameter of increasing of weight of relevant existing edges influenced by creation of a new edge from intermediary to object
δ4 = 0.0010 parameter of increasing of weight of relevant existing edges influenced by creation of a new edge from a user to an intermediary
δ = 0.0001 parameter of increasing of weight of relevant existing edges influenced by creation of a new edge from the intermediary to the object
Parameter of relevant node strength decreasingγ1 = 0.01 parameter of object strength decreasing
γ2 = 0.01 parameter of intermediary strength decreasing
Initial values for simulationsU0 = 50, V0 = 5, E0 = 10

References

  1. Otsuka, M.; Tsugawa, S. Robustness of network attack strategies against node sampling and link errors. PLoS ONE 2019, 14, e0221885. [Google Scholar] [CrossRef] [PubMed]
  2. Naylor, L.; Brady, U.; Quinn, T.; Brown, K.; Anderies, J.M. A multiscale analysis of social-ecological system robustness and vulnerability in Cornwall, UK. Reg. Environ. Chang. 2019, 19, 1835–1848. [Google Scholar] [CrossRef] [Green Version]
  3. Šiljak, D.D. Dynamic graphs. Nonlinear Anal. Hybrid Syst. 2008, 2, 544–567. [Google Scholar] [CrossRef]
  4. De Lellis, P.; DiMeglio, A.; Garofalo, F.; Iudice, F.L. The evolving cobweb of relations among partially rational investors. PLoS ONE 2017, 12, e0171891. [Google Scholar]
  5. Zhou, C.; Kurths, J. Dynamical Weights and Enhanced Synchronization in Adaptive Complex Networks. Phys. Rev. Lett. 2006, 96, 164102. [Google Scholar] [CrossRef] [Green Version]
  6. Newman, M.E.J. The Structure and Function of Complex Networks. SIAM Rev. 2003, 45, 167–256. [Google Scholar] [CrossRef] [Green Version]
  7. Albert, R.; Barabási, A.-L. Statistical mechanics of complex networks. Rev. Mod. Phys. 2002, 74, 47–97. [Google Scholar] [CrossRef] [Green Version]
  8. Dorogovtsev, S.; Mendes, J.F. Evolution of networks. Adv. Phys. 2002, 51, 1079–1187. [Google Scholar] [CrossRef] [Green Version]
  9. Souza, P.J.P.; Comin, C.H.; Costa, L.D.F. Topology and dynamics in complex networks: The role of edge reciprocity. EPL (Europhys. Lett.) 2018, 122, 12001. [Google Scholar] [CrossRef] [Green Version]
  10. Hou, L.-L.; Small, M.; Lao, S. Dynamical Systems Induced on Networks Constructed from Time Series. Entropy 2015, 17, 6433–6446. [Google Scholar] [CrossRef] [Green Version]
  11. Zufiria, P.J.; Barriales-Valbuena, I. Analysis of Basic Features in Dynamic Network Models. Entropy 2018, 20, 681. [Google Scholar] [CrossRef] [Green Version]
  12. Castellano, C.; Fortunato, S.; Loreto, V. Statistical physics of social dynamics. Rev. Mod. Phys. 2009, 81, 591–646. [Google Scholar] [CrossRef] [Green Version]
  13. Strogatz, S. Exploring complex networks. Nature 2001, 410, 268–276. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  14. Fu, M.; Yang, H.; Feng, J.; Guo, W.; Le, Z.; Lande, D.; Manko, D. Preferential information dynamics model for online social networks. Phys. A Stat. Mech. Its Appl. 2018, 506, 993–1005. [Google Scholar] [CrossRef]
  15. Dorogovtsev, S.; Mendes, J. Evolution of Networks; Oxford University Press (OUP): New York, NY, USA, 2003. [Google Scholar]
  16. Hou, R.; Wu, J.; Du, H.S. Customer social network affects marketing strategy: A simulation analysis based on competitive diffusion model. Phys. A Stat. Mech. Its Appl. 2017, 469, 644–653. [Google Scholar] [CrossRef] [Green Version]
  17. Nikakhtar, N.; Jianzheng, Y. Impact of network on E-commerce economy, Analysis on a price competition model. Life Sci. J. 2013, 10, 2801–2808. [Google Scholar]
  18. Wan, C.; Li, T.; Guan, Z.-H.; Wang, Y.; Liu, X. Spreading dynamics of an e-commerce preferential information model on scale-free networks. Phys. A Stat. Mech. Its Appl. 2017, 467, 192–200. [Google Scholar] [CrossRef]
  19. Pongnumkul, S.; Motohashi, K. A bipartite fitness model for online music streaming services. Phys. A Stat. Mech. Its Appl. 2018, 490, 1125–1137. [Google Scholar] [CrossRef]
  20. De Silva, E.; Stumpf, M.P.H. Complex networks and simple models in biology. J. R. Soc. Interface 2005, 2, 419–430. [Google Scholar] [CrossRef] [Green Version]
  21. Costa, L.D.F.; Rodrigues, F.; Cristino, A.S. Complex networks: The key to systems biology. Genet. Mol. Boil. 2008, 31, 591–601. [Google Scholar] [CrossRef] [Green Version]
  22. Mall, R.; Cerulo, L.; Bensmail, H.; Iavarone, A.; Ceccarelli, M. Detection of statistically significant network changes in complex biological networks. BMC Syst. Boil. 2017, 11, 32. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Barabási, A.-L.; Gulbahce, N.; Loscalzo, J. Network medicine: A network-based approach to human disease. Nat. Rev. Genet. 2011, 12, 56–68. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  24. Chan, S.Y.; Loscalzo, J. The emerging paradigm of network medicine in the study of human disease. Circ. Res. 2012, 111, 359–374. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  25. Zhao, J.; Liu, Q.; Wang, L.; Wang, X. Prediction of competitive diffusion on complex networks. Phys. A Stat. Mech. Its Appl. 2018, 507, 12–21. [Google Scholar] [CrossRef]
  26. Wang, H.; Wang, J.; Small, M.; Moore, J.M. Review mechanism promotes knowledge transmission in complex networks. Appl. Math. Comput. 2019, 340, 113–125. [Google Scholar] [CrossRef]
  27. Spadon, G.; Brandoli, B.; Eler, D.M.; Rodrigues-Jr, J.F. Detecting multi-scale distance-based inconsistencies in cities through complex-networks. J. Comput. Sci. 2019, 30, 209–222. [Google Scholar] [CrossRef]
  28. Liu, W.; Liu, C.; Yang, Z.; Liu, X.; Zhang, Y.; Wei, Z. Modeling the propagation of mobile malware on complex networks. Commun. Nonlinear Sci. Numer. Simul. 2016, 37, 249–264. [Google Scholar] [CrossRef]
  29. Li, W.; Cai, X. Statistical analysis of airport network of China. Phys. Rev. E 2004, 69, 046106. [Google Scholar] [CrossRef] [Green Version]
  30. Drlik, M.; Beranek, L. The role of an online social network in informal learning. In Proceedings of the 12th International Conference on Efficiency and Responsibility in Education (ERIE), Prague, Czech Republic, 5–6 June 2015; pp. 81–88. [Google Scholar]
  31. Saavedra, S.; Reed-Tsochas, F.; Uzzi, B. A simple model of bipartite cooperation for ecological and organizational networks. Nature 2008, 457, 463–466. [Google Scholar] [CrossRef]
  32. Chandra, A.; Garg, H.; Maiti, A. A general growth model for online emerging user–object bipartite networks. Phys. A Stat. Mech. Its Appl. 2019, 517, 370–384. [Google Scholar] [CrossRef]
  33. Li-Xin, T.; He, Y.; Liu, H.; Du, R. A general evolving model for growing bipartite networks. Phys. Lett. A 2012, 376, 1827–1832. [Google Scholar]
  34. Koskinen, J.; Edling, C. Modelling the evolution of a bi-partite network Peer referral in interlocking directorates*. Soc. Networks 2012, 34, 309–322. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  35. Medo, M.; Mariani, M.S.; Lü, L. Link Prediction in Bipartite Nested Networks. Entropy 2018, 20, 777. [Google Scholar] [CrossRef] [Green Version]
  36. Zhang, C.-X.; Zhang, Z.-K.; Liu, C. An evolving model of online bipartite networks. Phys. A Stat. Mech. Its Appl. 2013, 392, 6100–6106. [Google Scholar] [CrossRef] [Green Version]
  37. Zhang, D.; Dai, M.; Li, L.; Zhang, C. Distribution characteristics of weighted bipartite evolving networks. Phys. A Stat. Mech. Its Appl. 2015, 428, 340–350. [Google Scholar] [CrossRef]
  38. Borgatti, S.P.; Halgin, D.S. On Network Theory. Organiz. Sci. 2011, 22, 1168–1181. [Google Scholar] [CrossRef] [Green Version]
  39. Yan, B.; Liu, Y.; Liu, J.; Cai, Y.; Su, H.; Zheng, H. From the Periphery to the Core: Information Brokerage in an Evolving Network. In Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}, International Joint Conferences on Artificial Intelligence, Stockholm, Sweden, 13–19 July 2018; pp. 3912–3918. [Google Scholar]
  40. Moraga-Gonzalez, J.L.; Wildenbeest, M.R. Comparison Sites, IESE Business School Working Paper No. 933. 1 July 2011. Available online: https://ssrn.com/abstract=1947292 (accessed on 22 January 2020).
  41. Barabasi, A.-L.; Albert, R.; Jeong, H. Mean-field theory for scale-free random networks. Phys. A Stat. Mech. Its Appl. 1999, 272, 173–187. [Google Scholar] [CrossRef] [Green Version]
  42. Ikematsu, K.; Murata, T. A Fast Method for Detecting Communities from Tripartite Networks. In Formal Aspects of Component Software; Springer Science and Business Media LLC: New York, NY, USA, 2013; Volume 8238, pp. 192–205. [Google Scholar]
  43. Liang Liang Feng Tsinghua University; Qianchuan Qianchuan Zhao Tsinghua University; Cangqi Cangqi Zhou Nanjing University of Science and Technology. An efficient method to find communities in K -partite networks. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Vancouver, BC, Canada, 27–30 August 2019; p. 534. [Google Scholar]
  44. Altiparmakis, A.; Hutter, S.; Kriesi, H. Greece—Punctuated Equilibrium: The Restructuring of Greek Politics. In European Party Politics in Times of Crisis; Cambridge University Press (CUP): Cambridge, UK, 2019; pp. 95–117. [Google Scholar]
  45. Barrat, A.; Barthelemy, M.; Vespignani, A. Modeling the evolution of weighted networks. Phys. Rev. E 2004, 70, 066149. [Google Scholar] [CrossRef] [Green Version]
  46. Yook, S.H.; Jeong, H.; Barabási, A.-L.; Tu, Y. Weighted Evolving Networks. Phys. Rev. Lett. 2001, 86, 5835–5838. [Google Scholar] [CrossRef] [Green Version]
  47. Barrat, A.; Barthelemy, M.; Pastor-Satorras, R.; Vespignani, A. The architecture of complex weighted networks. Proc. Natl. Acad. Sci. USA 2004, 101, 3747–3752. [Google Scholar] [CrossRef] [Green Version]
  48. DALL’ASTA, L. Phenomenes Dynamiques Sur Des Reseaux Complexes. Ph.D. Thesis, University of Paris, Paris, France, June 2006. [Google Scholar]
  49. CERNY, Ales. E-shop War: Alza the Biggest e-shop Leaves the Biggest Price Comparator Heureka: (in Czech). iDnes [online]. 2016. 5-19-2016. Available online: https://www.idnes.cz/ekonomika/domaci/alza-opousti-heureku-a-vyzyva-k-tomu-i-ostatni.A160519_153822_ekonomika_rny (accessed on 14 September 2019).
  50. Ravi, S.; Ruth, C.K. Revisit the Debate on Intermediation, Disintermediation and Reintermediation due to E-commerce. Electron. Markets 2003, 13, 153–162. [Google Scholar]
  51. Burt, R. The Network Entrepreneur. In Entrepreneurship; Swedberg, R., Ed.; Oxford Management Readers: Oxford, UK, 2000; pp. 281–307. [Google Scholar]
  52. Cardoso, F.M.; Gracia-Lazaro, C.; Moisan, F.; Goyal, S.; Sanchez, A.; Moreno, Y. Trading in Complex Networks. Economics Physics 2019. [Google Scholar] [CrossRef]
  53. Jung, K.; Cho, Y.C.; Lee, S. Online shoppers’ response to price comparison sites. J. Bus. Res. 2014, 67, 2079–2087. [Google Scholar] [CrossRef]
  54. Hase, R.; Shinomiya, N. A mathematical modeling technique with network flows for social welfare maximization in deregulated electricity markets. Oper. Res. Perspect. 2016, 3, 59–66. [Google Scholar] [CrossRef] [Green Version]
  55. Kumar, P.; Lemionet, A.; Venugopa, V. Link Prediction in the Pinterest Network, 2011, Stanford, Project Proposals. Available online: http://snap.stanford.edu/cs224w-17-data/best-proposals-16/cs224w-project-proposal-poorna-amelia-viswa.pdf (accessed on 22 January 2020).
  56. Masayasu, K. Bank-Insurer-Firm Tripartite Interconnectedness of Credit Risk Exposures in a Cross-Shareholding Network 2018. Risk Manage. 2018, 20, 273–303. [Google Scholar]
  57. Neubauer, N.; Obermayer, K. Tripartite community structure in social bookmarking data. New Rev. Hypermedia Multimedia 2011, 17, 267–294. [Google Scholar] [CrossRef]
  58. Manlove, K.; Aiello, C.; Sah, P.; Cummins, B.; Hudson, P.J.; Cross, P.C. The ecology of movement and behaviour: A saturated tripartite network for describing animal contacts. Proc. R. Soc. B-Biol. Sci. 2018, 285, 20180670. [Google Scholar] [CrossRef] [Green Version]
  59. Wang, F.; Jia, C.; Wang, X.; Liu, J.; Xu, S.; Liu, Y.; Yang, C. Exploring all-author tripartite citation networks: A case study of gene editing. J. Inf. 2019, 13, 856–873. [Google Scholar] [CrossRef]
  60. Xu, S.; Zhang, Q.; Lu, L.; Mariania, M.S. Recommending investors for new startups by integrating network diffusion and investors’ domain preference. Inf. Sci. 2020, 515, 103–1157. [Google Scholar] [CrossRef] [Green Version]
  61. Anaconda. 2019. Available online: https://www.anaconda.com/distribution/ (accessed on 22 January 2020).
  62. Beranek, L.; Remes, R. E-commerce network with price comparator sites. In Proceedings of the 2019 9th International Conference on Advanced Computer Information Technologies (ACIT), Ceske Budejovice, Czechia, 5–7 June 2019; Institute of Electrical and Electronics Engineers (IEEE): Los Alamitos, CA, USA, 2019; pp. 401–404. [Google Scholar]
  63. Beranek, L.; Hanzal, P. Price comparison sites and their influence on e-commerce processes. In Proceedings of the 35th International Conference Mathematical Methods in Economics (MME), Hradec Kralove, Czech Republic, 13–15 September 2017; pp. 48–53. [Google Scholar]
  64. Michal, P.; Klimek, P.; Jurickova, E.; Palka, P. Comparison shopping agents and Czech online customers’ shopping behavior. Int. J. Entrep. Knowl. 2016, 4, 62–69. [Google Scholar]
Figure 1. (a) Bipartite network, (b) tripartite network (our model, e.g., network with intermediaries), and (c) marking of edge weights and node strengths of individual actors.
Figure 1. (a) Bipartite network, (b) tripartite network (our model, e.g., network with intermediaries), and (c) marking of edge weights and node strengths of individual actors.
Entropy 22 00263 g001
Figure 2. The log–log plot of the change of strength s j V ( t ) (a, on the left) and the log–log plot of the change of strength s j R ( t ) (b, in the middle, and c, on the right) with the time t for different values of p4 and p5 and with other fixed parameters given in Table A1 in Appendix C, with tj = 2. The lines correspond to the theoretical results, red line in Figure 2a,b is for the values p4 = 0.630, p5 = 0.309, blue line is for the values p4 = 0.309, p5 = 0.630, and the corresponding marks for the simulation results are red (∗) and blue (△). In (c), the results are shown for the values p3 = 0.630, p4 = 0.309 (red line), and p4 = 0.05, p5 = 0.88 (blue line).
Figure 2. The log–log plot of the change of strength s j V ( t ) (a, on the left) and the log–log plot of the change of strength s j R ( t ) (b, in the middle, and c, on the right) with the time t for different values of p4 and p5 and with other fixed parameters given in Table A1 in Appendix C, with tj = 2. The lines correspond to the theoretical results, red line in Figure 2a,b is for the values p4 = 0.630, p5 = 0.309, blue line is for the values p4 = 0.309, p5 = 0.630, and the corresponding marks for the simulation results are red (∗) and blue (△). In (c), the results are shown for the values p3 = 0.630, p4 = 0.309 (red line), and p4 = 0.05, p5 = 0.88 (blue line).
Entropy 22 00263 g002
Figure 3. The log–log plot of objects strength distribution P ( s V ) changes over objects strength s V (a, left) and the log–log plot of intermediary strength distribution P ( s R ) changes over intermediary strength s R (b, in the middle, and c, on the right) for different values of p4 and p5 with other fixed parameters given in the Table A1 in Appendix C. The lines correspond to the theoretical results, red line in (a,b) is for the values p4 = 0.630 and p5 = 0.309, respectively, and blue line is for the values p4 = 0.309 and p5 = 0.630, and the corresponding marks for the simulation results are red (∗) and blue (△). In (c), the results are shown for the values p4 = 0.309 and p5 = 0.630, blue line is for the values p4 = 0.05 and p5 = 0.88, and the corresponding marks for the simulation results are red (∗) and blue (△). The comparison between simulation and analytic results for weight distributions with system sizes t = 4000.
Figure 3. The log–log plot of objects strength distribution P ( s V ) changes over objects strength s V (a, left) and the log–log plot of intermediary strength distribution P ( s R ) changes over intermediary strength s R (b, in the middle, and c, on the right) for different values of p4 and p5 with other fixed parameters given in the Table A1 in Appendix C. The lines correspond to the theoretical results, red line in (a,b) is for the values p4 = 0.630 and p5 = 0.309, respectively, and blue line is for the values p4 = 0.309 and p5 = 0.630, and the corresponding marks for the simulation results are red (∗) and blue (△). In (c), the results are shown for the values p4 = 0.309 and p5 = 0.630, blue line is for the values p4 = 0.05 and p5 = 0.88, and the corresponding marks for the simulation results are red (∗) and blue (△). The comparison between simulation and analytic results for weight distributions with system sizes t = 4000.
Entropy 22 00263 g003
Figure 4. The log–log plot of change of strength s j V ( t ) (a, left) and the log–log plot of the change of strength s j R ( t ) (b, on the right) with the time t for different values of p7 (probability that the object will refuse to use the service of an intermediary) with other fixed parameters given in Table A1 in Appendix C, with tj = 2. Red line is for value p7 = 0, and blue line is for value p7 = 0.02.
Figure 4. The log–log plot of change of strength s j V ( t ) (a, left) and the log–log plot of the change of strength s j R ( t ) (b, on the right) with the time t for different values of p7 (probability that the object will refuse to use the service of an intermediary) with other fixed parameters given in Table A1 in Appendix C, with tj = 2. Red line is for value p7 = 0, and blue line is for value p7 = 0.02.
Entropy 22 00263 g004
Figure 5. The log–log plot of objects strength distribution P ( s V ) changes over objects strength s V (a, left) and the log–log plot of intermediary strength distribution P ( s j R ) changes over intermediary strength s j R (b, in the middle, and c on the right) for different values p7 (probability that the object will refuse to use the service of an intermediary) with other fixed parameters given in the Table A1 in Appendix C. The lines correspond to the theoretical results, red line is for value p7 = 0, blue line is for value p7 = 0.01 in (a,b), and the corresponding marks for simulation results are red (∗) and blue (△). In (c), the results are shown for the values p7 = 0 (red line) and p7 = 0.05 (blue line), and the corresponding marks for simulation results are red (∗) and blue (△). The comparison between simulation and analytic results for weight distributions with system sizes t = 4000.
Figure 5. The log–log plot of objects strength distribution P ( s V ) changes over objects strength s V (a, left) and the log–log plot of intermediary strength distribution P ( s j R ) changes over intermediary strength s j R (b, in the middle, and c on the right) for different values p7 (probability that the object will refuse to use the service of an intermediary) with other fixed parameters given in the Table A1 in Appendix C. The lines correspond to the theoretical results, red line is for value p7 = 0, blue line is for value p7 = 0.01 in (a,b), and the corresponding marks for simulation results are red (∗) and blue (△). In (c), the results are shown for the values p7 = 0 (red line) and p7 = 0.05 (blue line), and the corresponding marks for simulation results are red (∗) and blue (△). The comparison between simulation and analytic results for weight distributions with system sizes t = 4000.
Entropy 22 00263 g005
Figure 6. (a) The log–log plot of the change of strength s j R ( t ) of an intermediary with the time t for different values of p8 (probability of decreasing the strength of an intermediary) with other fixed parameters given in Table A1 in Appendix C. Red line is for value p8 = 0, and blue line is for value p8 = 0.01. (b,c): The log–log plot of intermediary strength distribution P ( s R ) changes over intermediary strength s R for different values p8 (probability of decreasing the strength of an intermediary) with other fixed parameters given in the Table A1 in Appendix C. The lines correspond to the theoretical results, red line is for value p8 = 0, blue line is for value p8 = 0.01 in (b), and the corresponding marks for simulation results are red (∗) and blue (△). In the (c), the results are shown for the values p7 = 0 (red line) and p7 = 0.05 (blue line), and the corresponding marks for simulation results are red (∗) and blue (△). The comparison between simulation and analytic results for weight distributions with system sizes t = 4000.
Figure 6. (a) The log–log plot of the change of strength s j R ( t ) of an intermediary with the time t for different values of p8 (probability of decreasing the strength of an intermediary) with other fixed parameters given in Table A1 in Appendix C. Red line is for value p8 = 0, and blue line is for value p8 = 0.01. (b,c): The log–log plot of intermediary strength distribution P ( s R ) changes over intermediary strength s R for different values p8 (probability of decreasing the strength of an intermediary) with other fixed parameters given in the Table A1 in Appendix C. The lines correspond to the theoretical results, red line is for value p8 = 0, blue line is for value p8 = 0.01 in (b), and the corresponding marks for simulation results are red (∗) and blue (△). In the (c), the results are shown for the values p7 = 0 (red line) and p7 = 0.05 (blue line), and the corresponding marks for simulation results are red (∗) and blue (△). The comparison between simulation and analytic results for weight distributions with system sizes t = 4000.
Entropy 22 00263 g006

Share and Cite

MDPI and ACS Style

Beranek, L.; Remes, R. Distribution of Node Characteristics in Evolving Tripartite Network. Entropy 2020, 22, 263. https://doi.org/10.3390/e22030263

AMA Style

Beranek L, Remes R. Distribution of Node Characteristics in Evolving Tripartite Network. Entropy. 2020; 22(3):263. https://doi.org/10.3390/e22030263

Chicago/Turabian Style

Beranek, Ladislav, and Radim Remes. 2020. "Distribution of Node Characteristics in Evolving Tripartite Network" Entropy 22, no. 3: 263. https://doi.org/10.3390/e22030263

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop