Next Article in Journal
Tropical Modeling of Battery Swapping and Charging Station
Previous Article in Journal
Modeling Robotic Thinking and Creativity: A Classic–Quantum Dialogue
Previous Article in Special Issue
Stability Analysis of Recurrent-Neural-Based Controllers Using Dissipativity Domain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Network Evolution Model with Preferential Attachment at Triadic Formation Step

1
Faculty of Mathematics and Mechanics, Saratov State University, 410012 Saratov, Russia
2
Faculty of Computer Science and Informatics, Saratov State University, 410012 Saratov, Russia
3
Faculty of Tax, Audit and Business Analysis, Financial University under the Government of the Russian Federation, 125993 Moscow, Russia
4
Finance and Credit Department, Peoples’ Friendship University of Russia (RUDN University), 117198 Moscow, Russia
5
Engineering Business and Management Faculty, Bauman Moscow State Technical University, 105005 Moscow, Russia
6
Industrial Management Department, National University of Science & Technology (MISIS), 119049 Moscow, Russia
7
Educational and Methodological Department, National University of Science & Technology (MISIS), 119049 Moscow, Russia
8
Higher School of Management, Peoples’ Friendship University of Russia (RUDN University), 117198 Moscow, Russia
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(5), 643; https://doi.org/10.3390/math12050643
Submission received: 22 January 2024 / Revised: 14 February 2024 / Accepted: 19 February 2024 / Published: 22 February 2024
(This article belongs to the Special Issue Complex Network Analysis of Nonlinear Time Series)

Abstract

:
It is recognized that most real systems and networks exhibit a much higher clustering with comparison to a random null model, which can be explained by a higher probability of the triad formation—a pair of nodes with a mutual neighbor have a greater possibility of having a link between them. To catch the more substantial clustering of real-world networks, the model based on the triadic closure mechanism was introduced by P. Holme and B. J. Kim in 2002. It includes a “triad formation step” in which a newly added node links both to a preferentially chosen node and to its randomly chosen neighbor, therefore forming a triad. In this study, we propose a new model of network evolution in which the triad formation mechanism is essentially changed in comparison to the model of P. Holme and B. J. Kim. In our proposed model, the second node is also chosen preferentially, i.e., the probability of its selection is proportional to its degree with respect to the sum of the degrees of the neighbors of the first selected node. The main goal of this paper is to study the properties of networks generated by this model. Using both analytical and empirical methods, we show that the networks are scale-free with power-law degree distributions, but their exponent γ is tunable which is distinguishable from the networks generated by the model of P. Holme and B. J. Kim. Moreover, we show that the degree dynamics of individual nodes are described by a power law.

1. Introduction

The structure and properties of many real networks cannot be meticulously captured by random graph models that cannot generate networks with complex cluster and community patterns. In social graphs, a simple yet realistic mechanism known as triadic closure is considered to be an important factor in producing high clustering and complex community structures. Triadic closure refers to the phenomenon where new links are formed between nodes that have a common neighbor, resulting in the closing of triads. This concept, first introduced by Rapoport in 1953 [1], highlights the tendency of real networks to exhibit a much higher likeliness of forming links between pairs of nodes that share a mutual neighbor compared to a random null model.
By leveraging the triadic closure effect, researchers and analysts can gain valuable insights into the organization and dynamics of complex networks. This knowledge can be utilized to facilitate the identification and analysis of communities within the network, enabling a better understanding of the collective behavior and interactions of its constituents. Furthermore, the study of triadic closure can inform the development of strategies for community detection, network growth modeling, and targeted interventions aimed at fostering collaboration and cooperation within these networks.
The triadic closure (TC) model developed in the study [2] uses the growth and preferential attachment mechanisms that are core to the Barabási–Albert (BA) model [3]. Moreover, the authors of [2] showed that the TC model generates networks that have a scale-free structure and whose degree distributions follow a power law. However, the TC model offers an additional feature that induces higher clustering compared to the BA model. This makes the networks obtained using the triadic closure model more similar to real social networks in terms of their clustering properties.
In the triadic closure model, when a new vertex is attached to the graph, it forms a link with an present vertex chosen based on preferential attachment. Preferential attachment is a mechanism where the probability of selecting a node to form a link with is proportional to its degree (i.e., the number of connections it already has).
In addition to the preferential attachment mechanism, the new node also forms other m 1 links. The probability of these links being formed with an existing node is determined by a parameter p. If p = 1 , then the new node joins a randomly selected neighbor of the first chosen node. This process, known as triad formation, strengthens the clustering in the network. On the other hand, if p = 0 , then the new node simply forms links based on the preferential attachment mechanism.
The triadic closure model allows one to generate graphs with different average clustering by changing the value of p. On the other hand, the resulting degree distributions in the networks generated by the TC model are exactly the same as in the BA model, following a power law with γ = 3 and do not depends on the value of p.
In the model proposed in [2], when a triad is formed, a new edge is attached to a random neighbor of a node, chosen uniformly from the nodes that were already selected in the previous step using the preferential attachment rule. However, in some complex networks, it appears that the selection of the second link is also performed using the preferential attachment rule, as follows:
  • In social networks, when a person becomes a friend with someone, they also tend to be a friend of the most popular individual in the group. Most social networks are clustered, so dealing with a large volume of emerging new information in various types of networks requires selecting relevant information from the ever-increasing data pool. This significantly increases the costs of data selection. Due to the difficulty of making choices, network participants will rely on the opinions of experts as the most authoritative members of these networks;
  • In citation networks, when an article cites a paper, it tends to cite the most cited items from the paper references as well;
  • If an Internet page links to an existing page, there are great chances that it also links to the most popular pages to which the existing page is pointed to;
  • In criminal structures: the tendency of two individuals to commit a crime together if they have a common accomplice.
In this paper, we present an enhancement to the triadic closure model by incorporating preferential selection of nodes during the triadic formation step. Unlike the basic model, where nodes are chosen uniformly, our proposed model allows for selective node choice. However, the dynamic nature of such models poses challenges in obtaining analytical descriptions and accurately identifying the network features that can be directly attributed to triadic closure.
To assess the effectiveness of our enhanced model, we conducted both analytical and empirical investigations into the geometric properties of the networks generated. Our findings demonstrate that a network simulated by the proposed model is scale-free, and is characterized by a power-law degree distribution. However, the exponent of the power-law, denoted as γ , can be adjusted or tuned in our model.
This distinction highlights the flexibility and versatility of our enhanced triadic closure model, as it allows for fine-grained control over the degree distribution exponent. Such control over the degree distribution exponent can have significant implications for network analysis and understanding real-world networks.
The paper is organized as follows. Section 2 presents a short review of recent studies on the topic. In Section 3, we introduce an extension of the triadic closure model based on the model of P. Holme and B. J. Kim. Moreover, in Section 3.2 we study the degree dynamics of a node in the networks generated by the extended triadic closure model. Finally, in Section 4 we show that the extended triadic closure model induces scale-free networks. Moreover, we show that the proposed model generates networks with tunable scale-free behavior (with its exponent γ depending on p and m), which differs from the behavior of the BA or the triadic closure models. The model under consideration generates networks with different levels of power-law exponent as well as clustering by varying p and m. Note that networks simulated by the triadic closure model exhibit a power-law degree distribution with exponent γ = 3 for any 0 p 1 .

2. Related Studies

Triadic closure is widely acknowledged as an essential mechanism in the formation of structural patterns in social networks. Numerous models of network formation have been proposed that incorporate triadic closure, typically as part of a growth or rewiring process.
This phenomenon is particularly pronounced in social networks, where individuals often tend to connect with others who are already connected to their acquaintances. Many studies show that this process of triadic closure leads to the formation of tightly-knit communities within the larger network, characterized by strong social ties and frequent interactions, including the following:
  • The patterns of the temporal behavior of triads in social networks have been studied in paper [4]. The authors state that triads are common in social groups and propose a probabilistic factor graph model that captures the dynamic information in the triadic closure process.
  • Paper [5] states that the community structure is an important property of complex social networks, while the triadic closure naturally implies the presence of community structure. The authors use a fitness-based link attractivity defined for a vertex to obtain a phase transition in which communities disappear.
  • The study [6] deals with the problem of community formation in online social networks. The paper focuses on the triad formation mechanism and uses data sets based on a large microblogging network. The study shows that the triadic closure depends on user demographics, network characteristics, and social properties. The authors propose a a probabilistic graphical model to predict the triad formation in dynamic networks.
  • The formation of social triads in social groups has been analyzed in paper [7]. The author conducted an empirical study based on data sets of two real social complex networks and they propose a method to predict inferring triadic tie strength dynamics.
  • The paper [8] deals with the problem of predicting missing links in the complex network using triadic closure theory. The work is aimed at quantifying the common neighbor influence on creating the link between nodes. It is shown that the proposed algorithm a sufficient accuracy and is stable and robust. Moreover, the authors propose an ensemble link prediction algorithm which is based on some local characteristics.
  • The paper [9] examines the temporal data sets taken from Flickr and Epinions. The study shows that the triad formation has a crucial role in the evolution of networks. Moreover, the authors developed a network evolution model which uses the preferential triadic closure. Numerical experiments show that the proposed model is capable in reproducing some global properties of real social networks.
  • The authors of paper [10] applied Relational Event Modeling (REM) to a dataset from online discussions. The paper examines social interaction based on micro-level temporal patterns.
  • The work [11] studies the effect of microstructures on the appearance of communities in networks. The authors use four community-detection approaches and three different generative network models including triadic closure.
  • Paper [12] proposes local closure coefficient to quantify the phenomenon of edge clustering in real social networks. The authors show that the use of the closure coefficient may improve link prediction in real network dynamics.
However, triadic closure is not solely limited to social networks. It also manifests in other types of networks, including knowledge networks, citation networks, and research collaboration networks, among many others. These networks often demonstrate a similar propensity for establishing connections between nodes that have mutual connections, suggesting the presence of underlying community structures, including the following:
  • The paper [13] proposes models of network growth in which the emergence of an edge between nodes is more likely if they have a common neighbor. Simulations have demonstrated that networks built using these models reproduce a number of features of real social networks, including high levels of clustering.
  • A large group of articles is devoted to citation networks, in which, as empirical studies show, the probability of triangle formation is high. Thus, the work [14] proposes a model for the evolution of scientific citation networks. The model takes into account both the loss of relevance of articles over time and the formation of triangles.
  • Another paper, [15] examines the citation network of scientific papers and proposes a stochastic model incorporating the triadic closure mechanism, statistics of links to scientific articles, as well as the dynamics of their citations. The authors substantiate the model using the example of citation dynamics for physics articles, identifying nonlinear citation dynamics, the nonlinearity of which is closely related to the network topology.
  • Citation networks were also the subject of research in [16], which analyzed co-citations on the Web of Science citation dataset. The model proposed by the authors takes into account the frequency of co-occurrence of the first author, the frequency of co-occurrence of other authors, network density, as well as triadic closure in the co-citation graph. The model allows one to predict the appearance of co-authors in the co-authorship network.
  • The study [17] notes that when modeling citation networks, it is necessary to take into account their high clustering. The authors propose a new model to explain the emergence of high clustering in such networks. The authors analyzed several real-life citation networks and showed that the proposed model adequately reproduces the power-law degree distribution and high clustering observed in these real-life networks.
  • The authors of paper [18] look at knowledge networks and show that triadic closure and topographical closeness increase the likelihood of creating connections, but do not affect their sustainability. The authors analyze the influence of endogenous network effects and how the cognitive proximity of actors influence the process of cluster creation.
  • The study [19] notes that the clustering coefficient does not reflect common interpersonal interpretations of triadic closure. In this regard, the study introduces a measure of triadic closure, which is used in the study of three empirical social networks.
  • Note that in some real networks the process of triangle formation is counterintuitive. The paper [20] examines the network of co-inventors and empirically finds that two inventors are less likely to form a first research partnership if they have mutual partners.
Many recent studies examined the triadic closure mechanism (the tendency for individuals with a common friend to become friends themselves) with respect to homophily in complex networks (the habit for individuals to build connections with others who are similar to them), including the following:
  • The paper [21] investigates the formation and nature of social networks in the context of Social Internet of Things (SIoT). The authors utilizes large datasets, including anonymized call detail records, to analyze triadic closure patterns and homophily in homophilic social networks. It proposes three social triad classes and explores the correlation between triads and homophily. The study concludes that there is a positive connection between homophily and a specific social triad class. Overall, this research contributes to the understanding of social networks in the SIoT context.
  • The study [22] explores the concept of homophily and its impact on social segregation. The authors challenge the belief that triadic closure and homophily work together and demonstrate through network analysis and empirical investigation that triadic closure can actually help reduce segregation. The findings are supported by real-world networks, strengthening the validity of the study. The authors suggest practical interventions to alleviate segregation in settings where triadic closure and homophily interact, as well as insights for designing interventions in online communities. Overall, this work makes a significant contribution to understanding social segregation and offers potential solutions.
  • The paper [23] examines how homophily (common interests) and triadic closure (mutual connections) affect the reciprocation benefit for content providers in social media. Using data from YouTube video providers, the researchers find that reciprocation is generally beneficial for the initiator, but content similarity and common ties can reduce the growth in subscribers. They also discover a positive interaction effect between content similarity and common ties. Overall, these findings provide practical implications for content providers and social media platforms seeking to optimize reciprocal promotion. The study sheds light on the complex dynamics of reciprocation in social media content promotion.
  • The study [24] examines the relationship between triadic closure and choice homophily, in social networks. Using a dynamic model, the researchers demonstrate that these factors contribute to induced homophily in real-world social networks. They estimate the degree to which triadic closure amplifies observed homophily in friendship and communication networks, and show that this augmentation can bring to the core-periphery structure of networks and the persistence of homophilic constraints. The study also highlights that even small individual biases can have significant network-level effects, such as segregation or the dominance of a core group. This paper highlights the importance of considering the broader dynamics of society when studying individual-level mechanisms in social networks.
The article [25] analyzes the friendship paradox as a property of triadic closure in networks, and some works explore empirical studies on triadic closure in real social networks in the context of innovation [20], the acting environment [26], as well as the criminal world [27], to simulate real processes of collaboration development.
Models of complex networks using the triadic closure mechanism studied by various researchers, have shown that their properties vary from those of the well-known BA and TC models (the Barabási–Albert (BA) model and the triadic closure (TC) model), as follows:
  • A static triadic closure (STC) model has been proposed in [28] for generating growth clustered networks. The author show that the proposed model is quite realistic and simple enough to obtain some of properties analytically.
  • The authors of paper [29] introduce an extension of the triadic closure model in which the number of attached links selected randomly. They show that the model simulates more realistically the dynamics of generated networks.
  • An interesting model that captures the dissimilarities between the incoming and outgoing network degrees has been analyzed in [30]. The model uses three different mechanisms including directed triadic closure. The authors empirically validate the model on real datasets.
  • A nonlinear coevolving voter model with triadic closure local rewiring has been developed and studied in [31]. The model is capable of explaining some properties of real adaptive social networks such as the reproduction of isolated parts and a high clustering.
  • The work [32] introduce a hierarchy of network evolution models based on triadic closure mechanism. The author uses a chemical kinetics framework to show that models reproduce an apparent metastability property of the microscale system.
  • The authors of paper [33] propose a Triangle Generalized Preferential Attachment Model and investigate the clustering properties of simulated networks. They show that this model generate networks with a power law degree distribution.
The works [34,35,36,37,38] present heuristic algorithms, e.g., for maximizing influence in graphs with a triadic closure mechanism (TC-IM).

3. The Extended Triadic Closure Model

3.1. The Model Description

The triadic closure model developed by P. Holme and B. J. Kim [2] is based on the well-known Barabási–Albert model [3] (the preferential attachment model). In this section, we describe and study a development of triadic closure model proposed by P. Holme and B. J. Kim [2]. The authors of [39] develop a model describing the growth of a network, in which one node and two links are added at each iteration, and this node is connected by two links with neighboring nodes. In this section, we will extend this model in two ways. First, we will add m 2 links at each iteration. Secondly, we will form a triad with the probability p (as it is in the classical triadic closure model).
In this model, when a new vertex is attached to the graph, it joins an existing node with a probability depending on the degree of that node, which is called the preferential attachment mechanism. Next, the remaining m 1 edges of the new node can be established with a certain neighbor of that node with probability p (so-called triad formation), or with probability 1 p , the new node can connect with any node in the network selected using preferential attachment rule.
At each iteration one node appears and is added to the network. For simplicity, we will use integer i to mark the node that appeared at the corresponding iteration i.
Let N ( t ) and M ( t ) be the number of nodes and the number of edges at iteration t, respectively.
Denote k j ( t ) the degree of node j at iteration t. Let
p ( j , i ) = 1 , if the link ( j , i ) exists , 0 , otherwise .
Then, we have
k i ( t ) = j = 1 N ( t ) p ( j , i ) .
Let s i ( t ) denote the total degrees for all neighbors of node i at iteration t:
s i ( t ) = j = 1 N ( t ) p ( i , j ) k j ( t ) .
In the network evolution model, the process develops step by step as follows:
  • (Growth) At every iteration t, one new vertex t is attached;
  • At each stage, the network is replenished with m new connections, and each new node t joins m existing nodes, taking into account the following rules:
    (a)
    (Preferential attachment)
    Node t links to one of the existing nodes i of the network with a probability depending on the degree of the node k i ( t ) ;
    (b)
    Each of the remaining m 1 edges of the new node t is established as follows:
    • (b1) (Triad formation)
      With probability p, new node t is linked to one of the neighbors j of node i selected at the previous stage, proportional to the degree of the vertex k j ( t ) . Therefore, the probability of choosing neighbor j of node i is p k j ( t ) s i ( t ) , where s i ( t ) is defined in Equation (1).
    • (b2) With probability 1 p , a link is established with one of the network nodes s (not necessarily adjacent to node i) with a probability proportional to the degree of this node k s ( t ) .
The proposed model is extension of the growth network model presented in paper [39]; if we take m = 2 then we obtain the model studied in [39] as a particular case of our model.

3.2. Degree Dynamics

In this model, every node i in the network has the possibility to increase the number of its links, i.e., its degree, at each iteration. This can happen in three different ways: at steps 2(a), 2(b1), and 2(b2).
When a new node is added to the network, it connects to one of the existing nodes. In step 2(a), the probability of choosing a node of degree k at time t is
k j = 1 N ( t ) k j ( t ) = k 2 M ( t ) ,
where N ( t ) denotes the number of nodes in the network, and M ( t ) is the number of links at time t. It is clear that N ( t ) = N 0 + ( t 1 ) and M ( t ) = M 0 + 2 m ( t 1 ) , where N 0 and M 0 are the numbers of nodes and links of the initial graph (before the first iteration), respectively.
If we consider the degree k i as a continuous quantity that represents the average of a set of random growth processes, as well as the rate at which node i acquires new connections as a result of new nodes joining it at iteration t involving steps 2(a), 2(b1), and 2(b2), then these processes will correspond to a certain equation, where p a ( i ) , p b 1 ( i ) , and p b 2 ( i ) —the probability of choosing node i at the corresponding steps.
If we represent the degree k i of node i as a continuous value, which is the average value for a set of random growth processes, and also take into account the rate at which node i acquires new links due to the addition of new nodes to it at iteration t, including steps 2(a), 2(b1), and 2(b2), then we can write the following equation
d k i ( t ) d t = p a ( i ) + p b 1 ( i ) + p b 2 ( i ) ,
in which p a ( i ) , p b 1 ( i ) , and p b 2 ( i ) represent the probabilities of choosing node i at the corresponding steps. We obtain
p a ( i ) = k i ( t ) 2 M ( t ) k i ( t ) 2 m t .
Let γ i ( t ) be defined as follows:
γ i ( t ) : = j = 1 N ( t ) p ( j , i ) k j ( t ) s j ( t ) ,
where s j ( t ) is defined in Equation (1).
To find the probability that vertex i is chosen at step 2(b1) we should calculate the sum (taken over all neighbors j for node i) each term of which is the multiplication of the following:
  • The expectation of picking node j at step 2(a), which is equal to k j ( t ) 2 M ( t ) ;
  • The product of the number of trials m 1 and the expectation of triad formation p;
  • The probability of picking vertex i among k j ( t ) neighboring nodes of vertex j, which is equal to k i ( t ) s j ( t ) .
Thus, we obtain
p b 1 ( i ) = p ( m 1 ) j = 1 N ( t ) p ( j , i ) k j ( t ) 2 M ( t ) k i ( t ) s j ( t ) = p ( m 1 ) k i ( t ) 2 M ( t ) j = 1 N ( t ) p ( j , i ) k j ( t ) s j ( t ) p ( m 1 ) k i ( t ) 2 m t γ i ( t ) ,
where γ i ( t ) is defined in (5).
We have
p b 2 ( i ) = ( 1 p ) ( m 1 ) k i ( t ) 2 M ( t ) ( 1 p ) ( m 1 ) k i ( t ) 2 m t .
It follows from (3), (4), (6), and (7) that k ¯ i ( t ) : = E ( k i ( t ) ) satisfies
d k ¯ i ( t ) d t = 1 + p ( m 1 ) γ i ( t ) + ( 1 p ) ( m 1 ) k ¯ i ( t ) 2 m t .
If we integrate Equation (8), we have the following dynamics for large t:
k ¯ i ( t ) c t i 1 + ( 1 p ) ( m 1 ) 2 m exp p ( m 1 ) 2 m γ i ( t ) t d t ,
where c is a constant satisfying the initial condition k i ( i ) = m .
Equation (9) shows the expected temporal trajectory for the degree of an individual node i. If m = 2 and p = 1 , then we obtain the dynamics (11) of the simple model described in paper [39]. The exponents β i have disparate values, which is completely different for the Barabási–Albert model.
Using simulations we will demonstrate that the trajectory of the expected degree for node i can be represented by a power law with exponent β i that depends on i:
k ¯ i ( t ) c t i β i .
A complete graph of five vertices was taken as an initial graph. This number of nodes in the initial graph is sufficient for the first iteration, since we take as m = 5 as the amount of edges added at each iteration. Then 200,000 iterations of the proposed triadic closure model were applied to the initial graph. Thus, in each experiment a graph of size 200,000 was constructed using the triadic closure mode with the preferential attachment at triadic formation step (as it is described in Section 3.1).
At certain iterations of the graph evolution, the values of the degrees for four fixed vertices were calculated as i = 2 (the vertex from the initial complete graph), and i = 10 , 50 , 100 .
We took m = 5 at the experiments. The probability p of triad formation was specified by the three different model parameters p = 0.75 , p = 0.5 , and p = 0.25 . For each of chosen values of m and p we carried out 100 experiments. Thus, we obtained the values of k i [ j ] ( t ) and the degree of node i = 2 , 10 , 50 , 100 at iteration t = 1 , , 2 · 10 5 obtained in simulation j = 1 , , 100 .
Then, the degrees of vertices were averaged over the 100 simulations at fixed iterations of graph construction; i.e., we calculate
k ¯ i ( t ) = 1 100 j = 1 100 k i [ j ] ( t ) .
The resulting dynamics of vertex degrees averaged over 100 simulated graphs are presented in Figure 1a,b ( p = 0.75 ), Figure 1c,d ( p = 0.5 )), and Figure 1e,f ( p = 0.25 ).
Model-based network simulations show that the temporal behavior of the degree of each individual node is not the same for all nodes. Although it obeys a power law, its exponent depends on the iteration in which the node appears in the network. In other words, the growth of every node’s degree follows a power-law, but its exponent β i depends on i (its value is close to 1 for node i = 2 , and β i quickly decreases to 1 + ( 1 p ) ( m 1 ) 2 m with increasing i). Thus, the temporal behavior of node degrees in the proposed model differs significantly from the corresponding dynamics in networks constructed using the BA or TC models, for which node degree dynamics follow a power-law growth with the same exponent 1 2 .
Model-based network simulations show that there is a limit of γ i ( t ) as t , γ i : = lim t γ i ( t ) . Consequently, the asymptotic behavior for large t satisfies the equation
k i ( t ) m t i 1 + ( 1 p ) ( m 1 ) + p ( m 1 ) γ i 2 m .
Equation (11) specifies the expected degree trajectory of an individual node over time. Experiments have shown that the exponents β i depend on the time of node appearance. It is known that in networks built using the Barabási–Albert model, the degree exponents are the same for all nodes.
Thus, the degree dynamics of an individual vertex i of the network follows the power law (10) with β i that depends on i. The normalization condition is
2 M N = 1 N i = 1 N k i 1 t 1 t m t x β ( x ) d x = 2 m ,
since the average degree over all the vertices is 2 M N = 2 m .
Equation (10) allows us to obtain several properties as follows:
  • First, the expectation of a fixed node’s degree increases as the network grows. This growth follows a power law with exponent β i , the value of which varies for different nodes.
  • Secondly, the smaller i, the higher the exponent β i . Consequently, the growth of node degrees in this model occurs faster for nodes that appear in the early stages of the network’s existence. As a result, the hubs in this model are larger compared to BA or TC models.

3.3. Additional Properties of γ i ’s

After t iterations, the algorithm described in Section 3.1 with parameters m and p produces a network of size N ( t ) t . Denote Γ m , p ( t ) the mean value of γ i ( t ) over i at iteration t, i.e.,
Γ m , p ( t ) : = 1 N ( t ) i = 1 N ( t ) γ i ( t ) .
We have
Γ m , p ( t ) = 1 N ( t ) i = 1 N ( t ) j = 1 N ( t ) p ( j , i ) k j ( t ) s j ( t ) = 1 N ( t ) j = 1 N ( t ) k j ( t ) s j ( t ) i = 1 N ( t ) p ( j , i ) = 1 N ( t ) j = 1 N ( t ) k j 2 ( t ) s j ( t ) .
The mean value of γ i k i over i,
1 N ( t ) i = 1 N ( t ) γ i ( t ) k i ( t ) = 1 N ( t ) i = 1 N ( t ) j = 1 N ( t ) p ( j , i ) k i ( t ) k j ( t ) s j ( t ) = 1 N ( t ) j = 1 N ( t ) k j ( t ) s j ( t ) i = 1 N ( t ) p ( j , i ) k i ( t ) = 1 N ( t ) j = 1 N ( t ) k j ( t ) s j ( t ) s j ( t ) = 1 N ( t ) j = 1 N ( t ) k j ( t ) = 2 M ( t ) N ( t ) = 2 m ,
i.e., it is equal to the mean value of k i over i, i.e., 2 m .
Theorem 1. 
Γ m , p ( t ) tends to a constant as t .
The proof of Theorem can be found in Appendix A.
Figure 2 shows the dynamics of Γ m , p ( t ) (with different choices of m and p) over t and that Γ m , p ( t ) tends to a constant depending on m and p as t .
We built networks of size N = 100,000 using the proposed model for various values of the model parameters m and p. During each experiment, for fixed parameter values, we built 10 networks, for each of them we found a value Γ m , p ( N ) using Equation (13), and then we recorded their average values in Table 1.
Theorem 2. 
The values of { γ i ( t ) } have the following properties:
  • E ( γ 1 ( t ) ) E ( γ 2 ( t ) ) E ( γ i ( t ) ) E ( γ i + 1 ( t ) ) ;
  • E ( γ i ( t ) ) 0 for as i , i.e., E ( β i ( t ) ) 1 + ( 1 p ) ( m 1 ) 2 m as i ;
  • The expected initial value of γ i ( i ) at iteration i is equal to
    E ( γ i ( i ) ) = 1 2 M ( i ) r = 1 i 1 1 + ( 1 p ) ( m 1 ) + p ( m 1 ) γ r ( i ) k r 2 ( i ) s r ( i ) .
The proof can be found in Appendix B.

4. Scale-Free Behavior

We study the stationary degree distribution as the number of iterations t . Let us calculate the difference in the number of nodes with degree k after adding one node at the iteration t (and m links are added connecting the newborn node with existing vertices).
Let q t ( s , k ) denote the probability that vertex s has degree k at iteration t.
Let p k ( t ) denote the probability that a randomly chosen node of the graph (at iteration t) has degree k. In another words, p k ( t ) is the share of nodes with degree k among all nodes of the network at iteration t.
By definition of q t ( s , k ) we have
1 t s = 1 t q t ( s , k 1 ) = p k 1 ( t ) ,
1 t + 1 s = 1 t + 1 q t + 1 ( s , k ) = p k ( t + 1 ) ,
1 t s = 1 t q t ( s , k ) = p k ( t ) .
Since every new node obtains degree m, we have
q t + 1 ( t + 1 , k ) = δ k , m ,
where δ k , j is the Kronecker delta, i.e.
δ k , j = 1 , k = j , 0 , k j .
Node s will have degree k at iteration t + 1 if the following occur:
  • The degree of vertex s is equal to k 1 at iteration t and it adds up by 1 at time t + 1 ;
  • The degree of node s at iteration t is k and it does not change at iteration t + 1 .
The probability that the degree of vertex s is equal to k 1 at iteration t and the node is chosen at step 2(a) of iteration t + 1 is
q t ( s , k 1 ) k 1 2 M ( t ) .
The probability that the degree of node s is equal to k 1 and the node is chosen at step 2(b1) of iteration t + 1 , is
p ( m 1 ) q t ( s , k 1 ) j = 1 N ( t ) p ( s , j ) k j 2 M ( t ) k 1 s j .
The probability that node s has degree k 1 and the node is chosen at step 2(b2) of iteration t + 1 is
( 1 p ) ( m 1 ) q t ( s , k 1 ) k 1 2 M ( t ) .
The probability that node s has degree k and the node is not chosen at iteration t + 1 is
q t ( s , k ) 1 k 2 M ( t ) p ( m 1 ) j = 1 N ( t ) p ( s , j ) k j 2 M ( t ) k s j ( 1 p ) ( m 1 ) k 2 M ( t ) .
Then,
q t + 1 ( s , k ) = q t ( s , k 1 ) k 1 2 M ( t ) + p ( m 1 ) q t ( s , k 1 ) j = 1 N ( t ) p ( s , j ) k j 2 M ( t ) k 1 s j + ( 1 p ) ( m 1 ) q t ( s , k 1 ) k 1 2 M ( t ) + q t ( s , k ) 1 k 2 M ( t ) p ( m 1 ) j = 1 N ( t ) p ( s , j ) k j 2 M ( t ) k s j ( 1 p ) ( m 1 ) k 2 M ( t ) .
If we sum up the left- and right- hand sides of (18) over s = 1 , , N ( t ) , we obtain by using of Equations (15)–(17) that
( t + 1 ) p k ( t + 1 ) δ k , m = t p k 1 ( t ) k 1 2 M ( t ) + p ( m 1 ) k 1 2 M ( t ) s = 1 N ( t ) q t ( s , k 1 ) j = 1 N ( t ) k j ( t ) s j ( t ) p ( s , j ) + ( 1 p ) ( m 1 ) t p k 1 ( t ) k 1 2 M ( t ) + t p k ( t ) t p k ( t ) k 2 M ( t ) p ( m 1 ) k 2 M ( t ) s = 1 N ( t ) q t ( s , k ) j = 1 N ( t ) k j ( t ) s j ( t ) p ( s , j ) ( 1 p ) ( m 1 ) t p k ( t ) k 2 M ( t ) .
Denote p k = lim t p k ( t ) the limit probability, then
( t + 1 ) p k ( t + 1 ) t p k ( t ) p k , t .
Using approximations N ( t ) t , M ( t ) m t and Equation (19) we obtain
2 m p k = 1 + ( 1 p ) ( m 1 ) ( k 1 ) p k 1 k p k + p ( m 1 ) lim t 1 t s = 1 t γ s ( t ) ( k 1 ) q t ( s , k 1 ) k q t ( s , k ) ,
where γ s ( t ) is defined in (5).
Tending t to infinity we obtain
lim t 1 t s = 1 t γ s ( t ) ( k 1 ) q t ( s , k 1 ) k q t ( s , k ) = A m , p lim t 1 t s = 1 t γ s ( t ) 1 t s = 1 t ( k 1 ) q t ( s , k 1 ) k q t ( s , k ) = A m , p ( ( k 1 ) p k 1 k p k ) Γ m , p ,
where A m , p is a constant and
Γ m , p : = lim t Γ m , p ( t ) .
It follows from (20) and (21) that
2 m p k = ( k 1 ) 1 + ( 1 p ) ( m 1 ) p k 1 k 1 + ( 1 p ) ( m 1 ) p k + A m , p p ( m 1 ) ( k 1 ) p k 1 Γ m , p A m , p p ( m 1 ) k p k Γ m , p .
It follows from (22) that
p k = ( k 1 ) 1 + ( 1 p ) ( m 1 ) + A m , p p ( m 1 ) Γ m , p 2 m + k 1 + ( 1 p ) ( m 1 ) + A m , p p ( m 1 ) Γ m , p p k 1 ,
and therefore
p k = c k γ m , p , γ m , p = 1 + 2 m 1 + ( 1 p ) ( m 1 ) + A m , p p ( m 1 ) Γ m , p ,
i.e., the degree distribution of the network follows the power law with its exponent γ m , p depending on m and p.
Table 2 shows the dependence of exponent γ m , p on different m and p obtained empirically in a series of experiments. In each experiment we generate ten networks of the same size where N = 100,000 with the use of the proposed model. Then, we averaged results over these networks. Table 2 demonstrates that exponents of degree distribution depend on the model parameters m and p.
Figure 3 presents the log–log plots of degree distributions for networks generated for different m and p. The plots show that the degree distributions follow the power law with the corresponding exponents that are present in Table 2.

5. Conclusions

In this paper, we consider the development of the triadic closure model, in which all nodes at each iteration are selected based on the preferential attachment mechanism. The results show that the stationary degree distribution follows a power law, but the value of the exponent is significantly different from the value of the exponent for the basic triadic closure model.
The model has the attractive feature of allowing networks to be created with different power law exponents for the degree distribution depending on the choice of model parameters. Moreover, the model allows one to generate networks with more realistic clustering that is inherent in real networks. However, issues related to the study of the behavior of local clustering coefficients, as well as the dynamic behavior of global clustering indicators, remained beyond the scope of this work. We believe that the study of these characteristics is a fairly important problem in the context of analyzing the capabilities and limitations inherent in the proposed network generation model.
We have shown that changing the mechanism of triad formation during network growth leads to significant changes in the structure of the generated networks. It would be interesting to study the influence of other mechanisms of triangle formation on the characteristics of the resulting networks. In addition, it is also important to ensure that these mechanisms lead to the creation of networks whose properties are close to those of real social networks.

Author Contributions

Conceptualization, S.M. and S.S.; methodology, S.M. and T.E.; software, T.E.; validation, E.S., Y.K., A.V., A.O. and L.P.; formal analysis, T.E.; investigation, T.E. and S.M.; resources, E.S., Y.K., A.V., A.O. and L.P.; data curation, E.S., Y.K., A.V., A.O. and L.P.; writing—original draft preparation, S.M. and T.E.; writing—review and editing, E.S., Y.K., A.V., A.O. and L.P.; visualization, S.M. and T.E.; supervision, S.S.; project administration, S.S.; funding acquisition, S.S. All authors have read and agreed to the published version of the manuscript.

Funding

The work was supported by the Russian Science Foundation, project 23-21-00148.

Informed Consent Statement

Not applicable.

Data Availability Statement

Publicly available datasets were analyzed in this study. This data and program code can be found here: https://github.com/mironovsv/Triad-PrefPref, accessed on 20 January 2024.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Appendix A. The Proof of Theorem 1

Proof. 
We will prove the statement in case of m = 2 and p = 1 . The other cases can be proved in an analogous way.
We will show that the expected values of increments
Δ Γ ( t + 1 ) = Γ ( t + 1 ) Γ ( t )
are non-positive. Then, Lemma follows from the fact that Γ ( t ) > 0 for all t.
For simplicity we let N ( t ) = t . The following terms in the sum (13) are changing with the transition from t to t + 1 :
  • All terms 1 t k j 2 ( t ) s j ( t ) in Γ ( t ) are replaced by 1 t + 1 k j 2 ( t ) s j ( t ) in Γ ( t + 1 ) , therefore the difference is
    j = 1 t 1 t + 1 1 t k j 2 ( t ) s j ( t ) = j = 1 t 1 t ( t + 1 ) k j 2 ( t ) s j ( t ) ;
  • New ( t + 1 ) -term is adding to Γ ( t + 1 ) :
    k t + 1 2 ( t + 1 ) ( t + 1 ) s t + 1 ( t + 1 ) = 4 ( t + 1 ) s t + 1 ( t + 1 ) , since k t + 1 ( t + 1 ) = 2 .
  • With probability k j ( t ) 4 t new node t + 1 increases the degree of node j by 1 and the value of s j ( t ) by 3, therefore the difference between the corresponding term in the sum Γ ( t + 1 ) and j-term in Γ ( t ) is
    ( k j ( t ) + 1 ) 2 ( t + 1 ) ( s j ( t ) + 3 ) k j 2 ( t ) t s j ( t ) + k j 2 ( t ) t ( t + 1 ) s j ( t ) = s j ( t ) ( 2 k j ( t ) + 1 ) 3 k j 2 ( t ) ( t + 1 ) s j ( t ) ( s j ( t ) + 3 ) ,
    Where term 1 t ( t + 1 ) k j 2 ( t ) s j ( t ) is added to annihilate the corresponding term in (A1);
  • If node j is chosen at step 2(a), then for each of its neighbors l the value of s l increases by 1, while their degrees remain the same, i.e., the difference is (with probability k j ( t ) 4 t )
    l = 1 t p ( l , j ) k l 2 ( t ) ( t + 1 ) ( s l ( t ) + 1 ) k l 2 ( t ) s l ( t ) + k l 2 ( t ) t ( t + 1 ) s l ( t ) = l = 1 t p ( l , j ) k l 2 ( t ) ( t + 1 ) s l ( t ) ( s l ( t ) + 1 ) ,
    where the last term is added to annihilate it in (A1);
  • The probability that node i (one of the neighbors of node j chosen at step 2(a)) will be chosen at step 2(b) is k i ( t ) s j ( t ) and the changes caused by this choice are:
    -
    New node t + 1 increases the degree of node i by 1 and the value of s i ( t ) by 3:
    ( k i ( t ) + 1 ) 2 ( t + 1 ) ( s i ( t ) + 3 ) k i 2 ( t ) t s i ( t ) + k i 2 ( t ) t ( t + 1 ) s i ( t ) = s i ( t ) ( 2 k i ( t ) + 1 ) 3 k i 2 ( t ) ( t + 1 ) s i ( t ) ( s i ( t ) + 3 ) ,
    -
    Each neighbors r of node i increases its value of s r by 1, while their degrees remain the same:
    r = 1 t p ( r , i ) k r 2 ( t ) ( t + 1 ) ( s r ( t ) + 1 ) k r 2 ( t ) t s r ( t ) + k r 2 ( t ) t ( t + 1 ) s r ( t ) = r = 1 t p ( r , i ) k r 2 ( t ) ( t + 1 ) s r ( t ) ( s r ( t ) + 1 ) .
Then,
Δ Γ ( t + 1 ) = Γ ( t + 1 ) Γ ( t ) = 1 t ( t + 1 ) j = 1 t k j 2 ( t ) s j ( t ) + 4 ( t + 1 ) s t + 1 ( t + 1 ) + j = 1 t k j ( t ) 4 t ( s j ( t ) ( 2 k j ( t ) + 1 ) 3 k j 2 ( t ) ( t + 1 ) s j ( t ) ( s j ( t ) + 3 ) l = 1 t p ( l , j ) k l 2 ( t ) ( t + 1 ) s l ( t ) ( s l ( t ) + 1 ) + i = 1 t p ( i , j ) k i ( t ) s j ( t ) s i ( t ) ( 2 k i ( t ) + 1 ) 3 k i 2 ( t ) ( t + 1 ) s i ( t ) ( s i ( t ) + 3 ) r = 1 t p ( r , i ) k r 2 ( t ) ( t + 1 ) s r ( t ) ( s r ( t ) + 1 ) ) .
It follows from
j = 1 N ( t ) p ( j , i ) k j ( t ) = s i ( t ) and j = 1 N ( t ) p ( j , i ) k j ( t ) s j ( t ) = γ i ( t )
that
Δ Γ ( t + 1 ) = Γ ( t + 1 ) Γ ( t ) = 1 t + 1 Γ ( t ) + 4 ( t + 1 ) s t + 1 ( t + 1 ) + + 1 2 ( t + 1 ) Γ ( t ) 3 4 t ( t + 1 ) j = 1 t k j 2 ( t ) s j ( t ) ( s j ( t ) + 3 ) + 1 4 t ( t + 1 ) j = 1 t k j ( t ) s j ( t ) + 3 3 4 t ( t + 1 ) j = 1 t k j 3 ( t ) s j ( t ) ( s j ( t ) + 3 ) 1 4 ( t + 1 ) Γ ( t ) + 1 4 t ( t + 1 ) j = 1 t k j 2 ( t ) s j ( t ) ( s j ( t ) + 1 ) + 1 2 t ( t + 1 ) i = 1 t γ i ( t ) k i 2 ( t ) s i ( t ) 3 4 t ( t + 1 ) i = 1 t γ i ( t ) k i 2 ( t ) s i ( t ) ( s i ( t ) + 3 ) + 1 4 t ( t + 1 ) i = 1 t γ i ( t ) k i ( t ) s i ( t ) + 3 3 4 t ( t + 1 ) i = 1 t γ i ( t ) k i 3 ( t ) s i ( t ) ( s i ( t ) + 3 ) 1 4 t ( t + 1 ) r = 1 t i = 1 t γ i ( t ) p ( r , i ) k i ( t ) k r 2 ( t ) s r ( t ) ( s r ( t ) + 1 ) .
Since the degree of every node is at least 2, then for every node j the average degree of its neighbors s j ( t ) / k j ( t ) 2 . Therefore, k j ( t ) s j ( t ) / 2 . Then, we can evaluate some positive terms in (A3) from the above as follows:
4 ( t + 1 ) s t + 1 ( t + 1 ) 1 t + 1 , since s t + 1 ( t + 1 ) 4 ,
1 4 t ( t + 1 ) j = 1 t k j ( t ) s j ( t ) + 3 1 8 t ( t + 1 ) j = 1 t s j ( t ) s j ( t ) + 3 1 8 ( t + 1 ) ,
1 4 t ( t + 1 ) j = 1 t k j 2 ( t ) s j ( t ) ( s j ( t ) + 1 ) 1 16 t ( t + 1 ) j = 1 t s j 2 ( t ) s j ( t ) ( s j ( t ) + 1 ) 1 16 ( t + 1 ) ,
1 2 t ( t + 1 ) i = 1 t γ i ( t ) k i 2 ( t ) s i ( t ) 1 4 t ( t + 1 ) i = 1 t γ i ( t ) k i ( t ) 1 t + 1 , ( with the help of ( 14 ) ) ,
1 4 t ( t + 1 ) i = 1 t γ i ( t ) k i ( t ) s i ( t ) + 3 1 8 t ( t + 1 ) i = 1 t γ i ( t ) s i ( t ) s i ( t ) + 3 1 8 ( t + 1 ) Γ ( t ) .
Then, neglecting some negative terms in (A3), the difference Δ Γ ( t + 1 ) can be estimated from above as follows:
Δ Γ ( t + 1 ) 7 2 ( t + 1 ) 3 4 ( t + 1 ) Γ ( t ) .
The solution of the differential equation
d f ( t ) d t = 7 2 ( t + 1 ) 3 4 ( t + 1 ) f ( t )
is a constant function. Thus, Δ Γ ( t + 1 ) 0 . □

Appendix B. The Proof of Theorem 2

Proof. 
We have
γ i ( t ) = j = 1 N ( t ) p ( j , i ) k j ( t ) s j ( t ) = S 1 , i ( t ) + S 2 , i ( t ) + S 3 , i ( t ) ,
where
S 1 , i ( t ) : = j = 1 i 1 p ( j , i ) k j ( t ) s j ( t ) , S 2 , i ( t ) : = p ( i + 1 , i ) k i + 1 ( t ) s i + 1 ( t ) , S 3 , i ( t ) : = j = i + 2 N ( t ) p ( j , i ) k j ( t ) s j ( t ) .
First, we find the expectation E ( S 1 , i ( t ) ) of the first term at time t. Denote j 1 ( i ) the node to which the node i was attached at step 2(a) of iteration i. Let j 2 ( i ) and j 3 ( i ) denote nodes to which vertex i was linked at step 2(b1) and 2(b2) of iteration i, respectively. Note that the iteration i is the moment of the appearance of node i, so j 1 ( i ) , j 2 ( i ) , j 3 ( i ) < i . Then, the first sum consists of three terms corresponding to the three nodes j 1 ( i ) , j 2 ( i ) , and j 3 ( t ) . The expectation of the first sum in (A4) at t can be estimated as follows:
E ( S 1 , i ( t ) ) = r = 1 i 1 p ( j 1 = r ) k r ( t ) s r ( t ) + p ( m 1 ) r = 1 i 1 p ( j 1 = r ) l = 1 i 1 p ( j 2 = l | j 1 = r ) k l ( t ) s l ( t ) + ( 1 p ) ( m 1 ) r = 1 i 1 p ( j 3 = r ) k r ( t ) s r ( t ) = r = 1 i 1 k r ( i ) 2 M ( i ) k r ( t ) s r ( t ) + p ( m 1 ) r = 1 i 1 k r ( i ) 2 M ( i ) l = 1 i 1 p ( l , r ) k l ( i ) s r ( i ) k l ( t ) s l ( t ) + ( 1 p ) ( m 1 ) r = 1 i 1 k r ( i ) 2 M ( i ) k r ( t ) s r ( t ) = ( 1 + ( 1 p ) ( m 1 ) ) r = 1 i 1 k r ( i ) 2 M ( i ) k r ( t ) s r ( t ) + p ( m 1 ) 1 2 M ( i ) l = 1 i 1 r = 1 i 1 p ( l , r ) k r ( i ) s r ( i ) k l ( i ) k l ( t ) s l ( t ) = 1 + ( 1 p ) ( m 1 ) 2 M ( i ) r = 1 i 1 k r ( i ) k r ( t ) s r ( t ) + p ( m 1 ) 2 M ( i ) l = 1 i 1 γ l ( i ) k l ( i ) k l ( t ) s l ( t ) = 1 2 M ( i ) r = 1 i 1 1 + ( 1 p ) ( m 1 ) + p ( m 1 ) γ r ( i ) k r ( t ) s r ( t ) k r ( i ) .
It follows from Equation (9) that
E ( S 2 , i ( t ) ) = 1 + ( 1 p ) ( m 1 ) + p ( m 1 ) γ i ( t ) k i ( i + 1 ) 2 M ( i + 1 ) k i + 1 ( t ) s i + 1 ( t ) .
It follows from Equation (A5) that
E ( S 1 , i + 1 ( t ) ) = 1 2 M ( i + 1 ) r = 1 i 1 + ( 1 p ) ( m 1 ) + p ( m 1 ) γ r ( i + 1 ) k r ( t ) s r ( t ) k r ( i + 1 ) .
It follows from (A5)–(A7) that
E ( S 1 , i + 1 ( t ) ) < E ( S 1 , i ( t ) ) + E ( S 2 , i ( t ) ) , E ( S 2 , i + 1 ( t ) ) + E ( S 3 , i + 1 ( t ) ) < E ( S 3 , i ( t ) ) ,
therefore,
E ( γ i ( t ) ) > E ( γ i + 1 ( t ) ) ,
and the first statement of the theorem is proved.
The second follows from (A5) as i . The third statement of the theorem follows from (A5) with t = i . □

References

  1. Rapoport, A. Spread of Information through a Population with Socio-Structural Bias: I. The Assumption of Transitivity. Bull. Math. Biophys. 1953, 15, 523–533. [Google Scholar] [CrossRef]
  2. Holme, P.; Kim, B.J. Growing scale-free networks with tunable clustering. Phys. Rev. E 2002, 65, 026107. [Google Scholar] [CrossRef]
  3. Barabási, A.L.; Albert, R. Emergence of Scaling in Random Networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef]
  4. Fang, Z.; Tang, J. Uncovering the Formation of Triadic Closure in Social Networks. In Proceedings of the 24th International Conference on Artificial Intelligence (IJCAI-15), Buenos Aires, Argentina, 25–31 July 2015; AAAI Press: Washington, DC, USA, 2015; pp. 2062–2068. [Google Scholar]
  5. Bianconi, G.; Darst, R.; Iacovacci, J.; Fortunato, S. Triadic closure as a basic generating mechanism of communities in complex networks. Phys. Rev. E-Stat. Nonlinear Soft Matter Phys. 2014, 90, 042806. [Google Scholar] [CrossRef]
  6. Huang, H.; Tang, J.; Liu, L.; Luo, J.; Fu, X. Triadic Closure Pattern Analysis and Prediction in Social Networks. IEEE Trans. Knowl. Data Eng. 2015, 27, 3374–3389. [Google Scholar] [CrossRef]
  7. Huang, H.; Dong, Y.; Tang, J.; Yang, H.; Chawla, N.V.; Fu, X. Will Triadic Closure Strengthen Ties in Social Networks? ACM Trans. Knowl. Discov. Data 2018, 12, 1–25. [Google Scholar] [CrossRef]
  8. Linyi, Z.; Shugang, L. The node influence for link prediction based on triadic closure structure. In Proceedings of the 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 15–17 December 2017; pp. 761–766. [Google Scholar]
  9. Li, M.; Zou, H.; Guan, S.; Gong, X.; Li, K.; Di, Z.; Lai, C.H. A coevolving model based on preferential triadic closure for social media networks. Sci. Rep. 2013, 3, 2512. [Google Scholar] [CrossRef]
  10. Chen, B.; Poquet, O. Socio-temporal dynamics in peer interaction events. In Proceedings of the Tenth International Conference on Learning Analytics & Knowledge, Frankfurt, Germany, 23–27 March 2020; pp. 203–208. [Google Scholar] [CrossRef]
  11. Wharrie, S.; Azizi, L.; Altmann, E. Micro-, meso-, macroscales: The effect of triangles on communities in networks. Phys. Rev. E 2019, 100, 022315. [Google Scholar] [CrossRef]
  12. Yin, H.; Benson, A.R.; Leskovec, J. The Local Closure Coefficient: A New Perspective On Network Clustering. In Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining (WSDM-19), Melbourne, VIC, Australia, 11–15 February 2019; pp. 303–311. [Google Scholar] [CrossRef]
  13. Jin, E.M.; Girvan, M.; Newman, M.E.J. Structure of growing social networks. Phys. Rev. E 2001, 64, 046132. [Google Scholar] [CrossRef]
  14. Wu, Z.X.; Holme, P. Modeling scientific-citation patterns and other triangle-rich acyclic networks. Phys. Rev. E 2009, 80, 037101. [Google Scholar] [CrossRef]
  15. Golosovsky, M.; Solomon, S. Growing complex network of citations of scientific papers: Modeling and measurements. Phys. Rev. E 2017, 95, 012324. [Google Scholar] [CrossRef]
  16. Muppidi, S.; Reddy, K. Co-occurrence analysis of scientific documents in citation networks. Int. J. Knowl.-Based Intell. Eng. Syst. 2020, 24, 19–25. [Google Scholar] [CrossRef]
  17. Ren, F.X.; Shen, H.W.; Cheng, X.Q. Modeling the clustering in citation networks. Phys. A Stat. Mech. Its Appl. 2012, 391, 3533–3539. [Google Scholar] [CrossRef]
  18. Juhasz, S.; Lengyel, B. Creation and persistence of ties in cluster knowledge networks. J. Econ. Geogr. 2017, 18, 1203–1226. [Google Scholar] [CrossRef]
  19. Brunson, J. Triadic analysis of affiliation networks. Netw. Sci. 2015, 3, 480–508. [Google Scholar] [CrossRef]
  20. Carayol, N.; Bergé, L.; Cassi, L.; Roux, P. Unintended triadic closure in social networks: The strategic formation of research collaborations between French inventors. J. Econ. Behav. Organ. 2019, 163, 218–238. [Google Scholar] [CrossRef]
  21. Khan, N.A.; Zhou, W.; Khan, M.A.; Almogren, A.; Din, I.U. Correlation between Triadic Closure and Homophily Formed over Location-Based Social Networks. Sci. Program. 2021, 2021, 10. [Google Scholar] [CrossRef]
  22. Abebe, R.; Immorlica, N.; Kleinberg, J.; Lucier, B.; Shirali, A. On the Effect of Triadic Closure on Network Segregation. In Proceedings of the 23rd ACM Conference on Economics and Computation (EC’22), Boulder, CO, USA, 11–15 July 2022; pp. 249–284. [Google Scholar] [CrossRef]
  23. Song, T.; Tang, Q.; Huang, J. Triadic Closure, Homophily, and Reciprocation: An Empirical Investigation of Social Ties Between Content Providers. Inf. Syst. Res. 2019, 30, 912–926. [Google Scholar] [CrossRef]
  24. Asikainen, A.; Iñiguez, G.; Ureña-Carrión, J.; Kaski, K.; Kivelä, M. Cumulative effects of triadic closure and homophily in social networks. Sci. Adv. 2020, 6, eaax7310. [Google Scholar] [CrossRef]
  25. Sidorov, S.; Mironov, S.; Grigoriev, A. Friendship paradox in growth networks: Analytical and empirical analysis. Appl. Netw. Sci. 2021, 6, 51. [Google Scholar] [CrossRef]
  26. Battiston, F.; Iacovacci, J.; Nicosia, V.; Bianconi, G.; Latora, V. Emergence of Multiplex Communities in Collaboration Networks. PLoS ONE 2016, 11, e0147451. [Google Scholar] [CrossRef]
  27. Nieto, A.; Davies, T.; Borrion, H. “Offending with the accomplices of my accomplices”: Evidence and implications regarding triadic closure in co-offending networks. Soc. Netw. 2022, 70, 325–333. [Google Scholar] [CrossRef]
  28. Cirigliano, L.; Castellano, C.; Baxter, G.; Timár, G. Strongly clustered random graphs via triadic closure: An exactly solvable model. Phys. Rev. E 2024, 109, 024306. [Google Scholar] [CrossRef]
  29. Sidorov, S.; Mironov, S. Growth network models with random number of attached links. Phys. A Stat. Mech. Its Appl. 2021, 576, 126041. [Google Scholar] [CrossRef]
  30. Brot, H.; Muchnik, L.; Louzoun, Y. Directed triadic closure and edge deletion mechanism induce asymmetry in directed edge properties. Eur. Phys. J. B 2015, 88, 12. [Google Scholar] [CrossRef]
  31. Raducha, T.; Min, B.; Miguel, M.S. Coevolving nonlinear voter model with triadic closure. Europhys. Lett. 2018, 124, 30001. [Google Scholar] [CrossRef]
  32. Zygalakis, K.; Higham, D.; Giovacchino, S. A Hierarchy of Network Models Giving Bistability Under Triadic Closure. Multiscale Model. Simul. 2022, 20, 1394–1410. [Google Scholar]
  33. Eikmeier, N.; Gleich, D.F. Classes of preferential attachment and triangle preferential attachment models with power-law spectra. J. Complex Netw. 2019, 8, cnz040. [Google Scholar] [CrossRef]
  34. Nie, M.; Chen, D.; Wang, D. Graph Embedding Method Based on Biased Walking for Link Prediction. Mathematics 2022, 10, 3778. [Google Scholar] [CrossRef]
  35. Brandenberger, L.; Casiraghi, G.; Nanumyan, V.; Schweitzer, F. Quantifying Triadic Closure in Multi-Edge Social Networks. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM ’19), Vancouver, BC, Canada, 27–30 August 2019; pp. 307–310. [Google Scholar] [CrossRef]
  36. Zhou, L.; Yang, Y.; Ren, X.; Wu, F.; Zhuang, Y. Dynamic Network Embedding by Modeling Triadic Closure Process. In Proceedings of the AAAI Conference on Artificial Intelligence, New Orleans, LA, USA, 2–7 February 2018; Volume 32, p. 1. [Google Scholar] [CrossRef]
  37. Yin, H.; Benson, A.R.; Ugander, J. Measuring directed triadic closure with closure coefficients. Netw. Sci. 2020, 8, 551–573. [Google Scholar] [CrossRef]
  38. Yang, J.; Wang, Z.; Rui, X.; Chai, Y.; Yu, P.S.; Sun, L. Triadic Closure Sensitive Influence Maximization. ACM Trans. Knowl. Discov. Data 2023, 17, 77. [Google Scholar] [CrossRef]
  39. Sidorov, S.; Mironov, S.; Faizliev, A.; Grigoriev, A. Node Degree Dynamics in Complex Networks Generated in Accordance with a Modification of the Triadic Closure Model. In Proceedings of the Mathematical Modeling and Supercomputer Technologies, Nizhny Novgorod, Russia, 23–27 November 2020; Balandin, D., Barkalov, K., Gergel, V., Meyerov, I., Eds.; Springer: Cham, Switzerland, 2021; pp. 146–153. [Google Scholar]
Figure 1. Degree dynamics of nodes i = 2 , 10 , 50 , 100 (a) p = 0.75 , (c) p = 0.5 and (e) p = 0.25 . We normalized the data to a common scale by dividing each value by the maximum degree of a node. We then plotted the trajectories of the degrees for different nodes i = 2 , 5 , 10 , 50 , 100 obtained for (b) p = 0.75 , (d) p = 0.5 , and (f) p = 0.25 in the log–log scale. For each log–log plot, we also calculated the slope using the linear regression method. The results are averaged over 100 independent runs for graphs of the same size where N = 200,000.
Figure 1. Degree dynamics of nodes i = 2 , 10 , 50 , 100 (a) p = 0.75 , (c) p = 0.5 and (e) p = 0.25 . We normalized the data to a common scale by dividing each value by the maximum degree of a node. We then plotted the trajectories of the degrees for different nodes i = 2 , 5 , 10 , 50 , 100 obtained for (b) p = 0.75 , (d) p = 0.5 , and (f) p = 0.25 in the log–log scale. For each log–log plot, we also calculated the slope using the linear regression method. The results are averaged over 100 independent runs for graphs of the same size where N = 200,000.
Mathematics 12 00643 g001
Figure 2. The dynamics of Γ m , p ( t ) over time for (a) m = 10 , p = 0.5 , (b) m = 25 , p = 0.75 , (c) m = 100 , p = 0.25 , and (d) m = 25 , p = 0.25 .
Figure 2. The dynamics of Γ m , p ( t ) over time for (a) m = 10 , p = 0.5 , (b) m = 25 , p = 0.75 , (c) m = 100 , p = 0.25 , and (d) m = 25 , p = 0.25 .
Mathematics 12 00643 g002
Figure 3. Log–log plots of degree distributions for networks generated with parameters (a) m = 10 , p = 0.5 ; (b) m = 100 , p = 0.25 ; (c) m = 25 , p = 0.25 ; (d) m = 25 , p = 0.75 .
Figure 3. Log–log plots of degree distributions for networks generated with parameters (a) m = 10 , p = 0.5 ; (b) m = 100 , p = 0.25 ; (c) m = 25 , p = 0.25 ; (d) m = 25 , p = 0.75 .
Mathematics 12 00643 g003
Table 1. The empirical values of Γ m , p obtained for different p and m. The values were calculated for networks of size N = 100,000.
Table 1. The empirical values of Γ m , p obtained for different p and m. The values were calculated for networks of size N = 100,000.
p m 25102550100
0.250.410.200.110.110.130.16
0.50.330.140.140.150.160.17
0.750.270.170.180.180.180.20
10.270.200.190.190.190.20
Table 2. The empirical values of the degree distribution exponent γ m , p obtained for different p and m. The values were calculated for networks of size N = 100,000.
Table 2. The empirical values of the degree distribution exponent γ m , p obtained for different p and m. The values were calculated for networks of size N = 100,000.
p m 25102550100
0.252.713.053.253.403.473.50
0.502.843.353.663.944.084.14
0.753.033.603.964.384.614.79
1.003.423.864.464.504.795.10
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sidorov, S.; Emelianov, T.; Mironov, S.; Sidorova, E.; Kostyukhin, Y.; Volkov, A.; Ostrovskaya, A.; Polezharova, L. Network Evolution Model with Preferential Attachment at Triadic Formation Step. Mathematics 2024, 12, 643. https://doi.org/10.3390/math12050643

AMA Style

Sidorov S, Emelianov T, Mironov S, Sidorova E, Kostyukhin Y, Volkov A, Ostrovskaya A, Polezharova L. Network Evolution Model with Preferential Attachment at Triadic Formation Step. Mathematics. 2024; 12(5):643. https://doi.org/10.3390/math12050643

Chicago/Turabian Style

Sidorov, Sergei, Timofei Emelianov, Sergei Mironov, Elena Sidorova, Yuri Kostyukhin, Alexandr Volkov, Anna Ostrovskaya, and Lyudmila Polezharova. 2024. "Network Evolution Model with Preferential Attachment at Triadic Formation Step" Mathematics 12, no. 5: 643. https://doi.org/10.3390/math12050643

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop