Next Article in Journal
S.O.V.O.R.A.: A Distributed Wireless Operating System
Previous Article in Journal
Release of the Fourth Season of Money Heist: Analysis of Its Social Audience on Twitter during Lockdown in Spain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Model for the Frequency Distribution of Multi-Scale Phenomena

1
Istituto di Informatica e Telematica (IIT–CNR), Via G. Moruzzi 1, 56124 Pisa, Italy
2
Dipartimento di Matematica, University of Parma, Parco Area delle Scienze 53/A, 43124 Parma, Italy
3
Dipartimento di Informatica, University of Pisa, Largo Pontecorvo 3, 56127 Pisa, Italy
*
Author to whom correspondence should be addressed.
Information 2020, 11(12), 580; https://doi.org/10.3390/info11120580
Submission received: 17 November 2020 / Revised: 9 December 2020 / Accepted: 11 December 2020 / Published: 13 December 2020

Abstract

:
Frequency analysis is often used to investigate the structure of systems representing multi-scale real-world phenomena. In many different environments, functional relationships characterized by a power law have been recognized, but, in many cases this simple model has turned out to be absolutely inadequate and other models have been proposed. In this paper, we propose a general abstract model which constitutes a unifying framework, including many models found in literature, like the mixed model, the exponential cut-off and the log-normal. It is based on a discrete-time stochastic process, which leads to a recurrence relation describing the temporal evolution of the system. The steady state solution of the system highlights the probability distribution, which underlies the frequency behavior. A particular instance of the general model, called cubic-cut-off, was analyzed and tested in a number of experiments, producing good answers in difficult cases, even in the presence of peculiar behaviors.

1. Introduction

A common activity in statistical science is the collection and the investigation of data in which underlying phenomenon can be described by random variables. Sometimes, data, for example human heights, are normally distributed. However, there exist many phenomena, called scale-free, where the data cannot be classified as normal distributions because the values do not gather around a mean value but span many orders of magnitude. Occurring in a wide variety of physical, biological, social, and information environments, these phenomena are assumed to have some common similarity in the structure of the underlying probability mechanisms [1].
To describe relations and processes occurring in real-world phenomena, different structures can be employed. A scalar phenomenon is characterized by a single distribution of values, called degrees, associated to given items. Examples of these phenomena are the world wealth or the word frequency in natural languages or the large cities populations.
A more complex structure is represented by the graphs (see Reference [2] and its extensive bibliography), where the edges provide connections among the nodes. The items are the nodes, and the number of edges connected to a node is its degree. A classical example is the graph which describes the structure of the web, where the nodes and the edges represent, respectively, the web pages and the links from one page to another. Graphs like this apply to many man-made and naturally occurring phenomena.
One of the most used methods to investigate these structures is the frequency analysis, which explores the relationship between the number of items having the same degree and the degree itself. For example, the analysis of large subsets of the web has shown that there are many pages with a small degree and few pages with a large degree.
Some phenomena belonging to different environments, e.g., the distribution of wealth in a society or the frequencies of words in natural languages or the frequency of the inlinks of a network, have been recognized to approximately follow functional relationships characterized by a power law [3], that is, a relation of the form f ( x ) = a x ρ , where ρ > 0 and a is a constant scaling factor. A power law has a well-defined mean over x [ 1 , ) only if ρ > 2 and is the only scale-free distribution.
For many other phenomena, such as, for example, the frequency of the outlinks of a network [4] or the population of cities, the pure power law is absolutely inadequate. In many cases, substantial modifications are required. Among them, the following ones have often been suggested: (1) the exponential cut-off, where the power law is corrected by an exponential term responsible of a faster decay of the solution for large j, and (2) the log-normal, where a log term is responsible for a bending down for small j.
Various underlying probability distributions have been proposed for modeling the frequency behavior. They are mainly based on an attachment strategy defining the relationship between the degree of an item and the probability that its degree is increased by 1. The simplest model, which adopts a uniform attachment strategy as suggested in Reference [2], would generate a random dataset with most items having a comparable number of degrees. This behavior does not reflect the real-world datasets, where there are many items with a very small degree and a not negligible part of hub items with high degree. To obviate this situation, a preferential attachment strategy has been proposed (see Reference [5]). This strategy complies especially with the “rich get richer” effect. A mixed model combines the uniform and preferential approaches (see, for example, Reference [6,7,8]).
To describe the frequency behavior of multi-scale phenomena, in this paper, we propose a general model, which constitutes a unifying abstract framework able to include many models found in literature, like the mixed model, the log-normal model, and the exponential cut-off model. It is based on a discrete-time stochastic process, which leads to a recurrence relation describing the temporal evolution of the system. The steady state solution of the system highlights the probability distribution, which underlies the frequency behavior and rules the strategy on which the attachment policy relies.
A particular instance of the general model, which we call the cubic-cut-off model, is taken into consideration with the aim of dealing, at the same time, with items having a very small degree or a very large degree, providing a correct characterization of the degree distributions on the full range of the available data, even in presence of peculiar behaviors. This cubic-cut-off model lends itself to a definition of the attachment strategy, which characterizes, in a simple way, the behavior of the system. It has been tested in a number of experiments, producing better answers than the classical models, even in difficult cases.
The paper is structured as follows. The structure of the datasets taken into consideration in our analysis and the formal definition of a general model from which stems our proposed cubic-cut-off model are described in Section 2.1 and Section 2.2. The discrete time stochastic process and the steady-state solution are described in Section 2.3. The classical Beta, power law, log-normal, and cut-off models are derived in Section 2.4 and Section 2.5. In Section 3, we examine the problems caused by the collection, the representation, and the fitting of the real-world data. Finally, in Section 4, we test our model in comparison with the classical ones on a collection of 39 files of data, extracted from 21 datasets, including typical examples, such as the web, the movie actors graph, the supermarket purchases, or the number of social media followers.

2. The Frequency Distribution Model

The world wealth, the word frequency in natural languages, or the large cities populations represent real-world phenomena in which structure is characterized by a single distribution of values. In order to describe the processes which guide their evolution, models of their frequency distributions are often devised. First of all, we give some definitions about the structure of the datasets we are considering.

2.1. The Structure of Datasets

The simplest way to treat real-world phenomena is to associate to each considered item, let’s say the kth one, a value y k which somewhat measures the feature of interest. For example, y k could be the number of occurrences of the kth word in a linguistic corpus or the number of inhabitants of the kth city. We say that y k is the degree of the kth item. The number of items having the same degree j is the frequency and is given by
Q j = # { k : y k = j } .
An analogous function can be referred to also when we deal with phenomena described by more complex structures. We examine for example the structure implementing graphs, which are usually addressed to design models using vertices (the nodes) and edges (the links) for the interconnections. The degree d e g ( v ) of a node v is the number of links connected to v, and the number of nodes having the same degree j is given by
Q j = # { v : d e g ( v ) = j } .
Definition (2) coincides with (1) if we assimilate node v to item k and d e g ( v ) to y k .
Generally, the values Q j which describe real-world phenomena span many orders of magnitude. For this reason, it is common in the literature to switch to the log-log plane for their graphical representation.

2.2. The Model

We give now the definition of a general model for describing the frequency behavior of multi-scale phenomena. Such a definition, based on infinite sequences verifying simple mathematical properties, aims at setting a unifying abstract framework for many approaches found in literature.
Definition 1.
A model M is a pair of positive real infinite sequences
M = ( p , f ) ,
where the sequence p = { p j } , with  j 0 , satisfies j = 0 p j = 1 , and the sequence f = { f j } satisfies
f j = p j 1 p j , for j 1 .
From (4), it follows that
p j = i = j + 1 f i , j = 1 j f j = j = 1 j ( p j 1 p j ) = j = 0 p j = 1 .
Thanks to these relations, a model M can be defined through any positive real infinite sequence g j such that j = 1 j g j converges to a limit θ , by setting
f j = g j / θ and p j = i = j + 1 f i .
Note that, in the rest of the paper, we use the notation p j , with implicitly varying index j, to denote either the jth element of sequence p = { p j } or the whole sequence, depending on the context.
In the following section, we briefly outline the discrete-time stochastic process which leads to a model of form (3), where the sequence f j is the expected value of the sequence Q j .

2.3. The Discrete-Time Stochastic Process

The frequency analysis, often used to investigate the structure of a system, allows a deep insight in the design underlying a dataset. The frequency distribution model we consider in this paper is based on the following discrete-time stochastic process: we assume that, at time t, a set of N ( t ) items exists, with  N ( 0 ) = 0 , and that t is updated corresponding to a unit increase of the degree of an item.
Let Q j ( t ) denote the number of items having degree j 1 . Then, N ( t ) = j Q j ( t ) and t = j j Q j ( t ) . In our setting Q j ( t ) and N ( t ) are random variables, in which expected values are q j ( t ) = E [ Q j ( t ) ] and n ( t ) = E N ( t ) , respectively.
Let p j ( t ) denote the probability that, at time t + 1 , an item having degree j is considered. There are two possibilities.
  • If the item is new, different from any item already existing in the set, it is added to the set and it is given degree 1. Let β , with  0 < β < 1 , be the probability of this event, i.e.,  p 0 ( t ) = β . Hence, n ( t ) = β t .
  • If the item already exists in the set, its degree is increased by 1. In this case, we assume that the event has a probability which is proportional to the ratio q j ( t ) / t , i.e.,
    p j ( t ) = δ j q j ( t ) t ,
    where δ j does not depend on t. Hence,
    j = 0 t p j ( t ) = 1 , j = 1 t q j ( t ) = β t and j = 1 t j q j ( t ) = t for any t .
The variation of q j ( t + 1 ) with respect to q j ( t ) is given by the equation
q j ( t + 1 ) q j ( t ) = p j 1 ( t ) p j ( t ) ,
which describes the temporal evolution of the stochastic system. We look for the steady-state solution of the system. So, we let t , p j = lim t p j ( t ) and assume q j ( t ) = t f j , with  f j independent from t. Hence, q j ( t + 1 ) q j ( t ) = f j , and, from (8), we get
f j = p j 1 p j , with p 0 = β and j = 0 p j = 1 .
Comparing with (4), we see that the pair M = ( p , f ) , with  p = { p j } and f = { f j } defines a model of the form (3). The solution f j is the expected value of the number of items having degree j, and the probability p j is the expected value of the total number of items having degree larger than j. An important feature to evaluate the qualitative evolution of the system is the ratio δ j = p j / f j , denoted attachment rule [9]. In the linear case, δ j is, apart from an additive constant, proportional to the degree j of the item. However, this kind of attachment, even if widely studied in the literature, is rarely observed in real-world data, while nonlinear attachments, where δ j depends on a nonlinear function of j, are more commonly observed [10]. In the following sections, both linear and nonlinear attachment rules are examined.

2.4. The Linear Case

We consider first the linear case
p j = δ j f j , where δ j = r + s j , with r 0 , s > 0 .
Replacing p j into (9), we have
f j = γ + j 1 ρ 1 f j 1 γ + j ρ 1 f j , where ρ 1 = 1 s , γ = r s .
This recurrence is solved exactly by the (complete) Beta function (a classical text for the Beta function is Reference [11] (p. 258), but, for its important properties, see Reference [12]). In fact, the Beta function B ( j , ρ ) for positive j and ρ verifies the recursion
B ( j , ρ ) = j 1 ρ 1 B ( j 1 , ρ ) j ρ 1 B ( j , ρ ) .
It follows that f j may have the form
f j = c B ( γ + j , ρ ) ,
provided that the series j = 1 j f j is convergent and c is chosen in such a way that the series converges to 1. The series converges only for ρ > 2 (that is s < 1 ), and it holds that
j = 1 j B ( γ + j , ρ ) = B ( γ + 1 , ρ 2 ) .
Then, model M is the pair ( p , f ) , where
f j = B ( γ + j , ρ ) B ( γ + 1 , ρ 2 ) and p j = B ( γ + j + 1 , ρ 1 ) B ( γ + 1 , ρ 2 ) ,
with
p 0 = B ( γ + 1 , ρ 1 ) B ( γ + 1 , ρ 2 ) = ρ 2 γ + ρ 1 = 1 s r + 1 < 1 , and δ j = γ + j ρ 1 .
If r > 0 , model M corresponds to the one known in literature as mixed model. In fact, we can give an interesting interpretation of formula (13) in the time dependent setting that we considered at the beginning of the section, by specifying the function δ j of (6). If the item considered at time t + 1 already exists, let k be its index. The mixed model specifies the following policy to choose k.
(a1)
With probability α , 0 < α < 1 , the index k is chosen accordingly to its degree j (this policy is known as preferential attachment), and
(a2)
with probability 1 α , the index k is chosen at random (this policy is known as uniform attachment).
Then, p j ( t ) with j 1 is given by the sum of two terms. Because of assumption (a2), the first term is proportional to q j ( t ) / n ( t ) , and, because of assumption (a1), the second term is proportional to j q j ( t ) / t , i.e.,
p j ( t ) = δ j q j ( t ) t , with δ j = r + s j , r = ( 1 β ) ( 1 α ) β , s = ( 1 β ) α .
Function δ j quantifies the attachment rule: the higher s, the more preferential the attachment. If the uniform attachment was the only policy applied, all the items would acquire approximately the same degree. When applied to graphs, the preferential attachment expresses the concept that new links tend to attach themselves to nodes already having more links.
From (14), we have
α = ( 1 + r ) s r + s and β = 1 s 1 + r .
Having assumed r > 0 and 0 < s < 1 , the condition 0 < α , β < 1 is verified. The steady-state solution (13) holds with
ρ = 1 + 1 α ( 1 β ) , γ = 1 α α β .
The starting condition for p j is in fact the same p 0 = β .
An asymptotic approximation v j of f j for large j is obtained by neglecting γ with respect to j and writing the first order expansion of B ( j , ρ ) for fixed ρ . We get
v j = d j ρ ,
where d is a suitable constant, showing that v j satisfies a power law. Function v j is a good approximation of f j for large j, as shown in Figure 1 where the log-log plots of f j (solid line) and of v j (dashed line) are given for two different choices of the parameters α and β .
The log-log representations of f j and v j are
f ^ ( z ) = log f exp ( z ) = log B ( γ + e z , ρ ) + log c , v ^ ( z ) = ρ z + log d ,
where z = log j .
Note that v j is not solution of a mixed model. The case of the power law function will be taken up again in the next section.

2.5. The General Case

When dealing with real-world data, often improperly collected or contaminated by noise, superpositions of more different models defined in not overlapping intervals of j have been suggested. We prefer instead to consider a single model obtained by combining some basic functions.
In literature many different functions f j have been proposed. Some of them lead to solutions of a model M , which implies a nonlinear ratio p j / f j . In general, pairs ( p j , f j ) which solve Equation (4) exactly are not immediately found. So, we suggest to choose some interesting f j and derive p j from them, as shown in Section 2.2.
In practice, f j is obtained by fitting given samples in the log-log space, i.e., by using its log-log representation
f ^ ( z ) = log f j , with z = log j .
f j must be normalized in such a way that j = 1 j f j = 1 . To guarantee the convergence of the series, we must assume that f j has an asymptotic growth rate lower than j 2 .
Let us examine some important examples.
  • The power law model, in which log-log function is a straight line
f ^ ( P ) ( z ) = a 0 + a 1 z ,
where a 1 < 2 , and a 0 guarantees that the solution
f j ( P ) = θ j a 1 , with θ = exp ( a 0 ) ,
is normalized. Setting ρ = a 1 , the model is
f j ( P ) = j ρ ζ ( ρ 1 ) , p j ( P ) = i = j + 1 f i ( P ) = ζ ( ρ , j + 1 ) ζ ( ρ 1 ) ,
where ζ ( s ) is the Riemann’s zeta function, and ζ ( s , q ) is the Hurwitz’s zeta function. Actually, this case has already been met in the previous section (see (15)) as an asymptotic approximation of the Beta function. In fact, f j ( P ) is a realization of the Zipf’s law, which describes the tail of a Yule-Simon distribution.
  • The log-normal model, in which log-log function is a parabola
f ^ ( L ) ( z ) = a 0 + a 1 z + a 2 z 2 ,
where a 2 < 0 , and a 0 guarantees that the solution
f j ( L ) = θ j a 1 exp a 2 log 2 j , with θ = exp ( a 0 ) ,
is normalized. The convergence of j = 1 j f j ( L ) follows from the convergence of the series of negative exponentials.
The log-normal solution coincides with the probability density function of the log-normal distribution, as can be seen by setting
σ 2 = 1 2 a 2 , μ = 1 + a 1 2 a 2 , a 1 z + a 2 z 2 = 1 2 σ 2 ( z μ ) 2 z + μ 2 2 σ 2 ,
f j ( L ) = θ 1 j exp ( log j μ ) 2 2 σ 2 , where θ = exp a 0 + μ 2 2 σ 2 .
  • The cut-off model, in which log-log function is an exponential
f ^ ( C ) ( z ) = a 0 + a 1 z + a e exp ( z ) ,
where a e < 0 , and a 0 guarantees that the solution
f j ( C ) = θ j a 1 exp a e j , with θ = exp ( a 0 ) ,
is normalized. As in the previous case, the convergence of j = 1 j f j ( C ) follows from the convergence of the series of negative exponentials. The cut-off solution coincides with the probability density function of the power law with exponential cut-off distribution.
  • We suggest a unifying approach: the function f ^ ( z ) is
f ^ ( O ) ( z ) = a 0 + a 1 z + a 2 z 2 + a 3 z 3 + a e exp ( z ) ,
where a e < 0 , and a 0 guarantees that the solution
f j ( O ) = θ j a 1 exp a 2 log 2 j exp a 3 log 3 j exp a e j , with θ = exp ( a 0 ) ,
is normalized.
The exponential term exp a e j is responsible of a faster decay of the solution with respect to the power law for large j, while the log terms are responsible for a bending down for small j. To show the different behaviors of the functions f j considered above, Figure 2 shows the log-log plots of f j ( P ) (solid line), f j ( L ) (dotted line), f j ( C ) (dotted-dashed line), and f j ( O ) (dashed line) obtained through a fitting procedure of a same dataset.
The probabilities p j ( O ) corresponding to f j ( O ) are derived as shown in Section 2.2, obtaining
f j ( O ) = p j 1 ( O ) p j ( O ) , then p j ( O ) = i = j + 1 f i ( O ) .
The pair ( p ( O ) , f ( O ) ) constitutes our proposed model, called cubic-cut-off. To get a better insight into the behavior of the model, it would be desirable to have an analytic expression for p j ( O ) . Unfortunately, functions p j ( O ) and f j ( O ) which satisfy the recurrence (4) exactly, as in the case of the functions f j and p j defined in (13), are not easy to be given in a closed-form.
Hence, we settle for an approximation π j of p j ( O ) . According to (22), π j 1 π j should approximate f j ( O ) . This suggests to express π j in the log-log scale with a basis similar to that used for f ^ ( O ) ( z ) . So, we assume for π ^ ( z ) an expression of the form
π ^ ( z ) = h ^ ( z ) + η exp ( z ) ,
where h ^ ( z ) is a function of order lower than exp ( z ) , and η < 0 is a coefficient to be determined; then,
π j = exp h ^ ( log j ) exp ( η j ) .
Now, we impose that the dominant terms of f j ( O ) and π j 1 π j in the asymptotic setting coincide. Since
π j 1 π j = exp ( h ^ ( log ( j 1 ) ) ) exp ( η ) exp h ^ ( log j ) exp ( η j ) ,
it follows that η = a e . We postpone the choice of a suitable function h ^ ( z ) to the next section, where a fitting technique is suggested. The validation of this procedure will be effectively checked by the experimentation.
The same technique allows finding also the probabilities corresponding to the log-normal and the cut-off functions.

3. Treatment of the Data

When data from real life phenomena are sampled and analyzed, intrinsic problems of various kind arise, namely:
  • The crawling process through which data are acquired can produce complete or partial datasets. English Wikipedia-2018 is an example of a complete crawling, whereas English Web must inevitably be partially crawled.
  • For the visualization of multi-scale data, a log-log plot is required, in order to better evidence the properties of the data and the possible correspondence with the chosen model. For example, if the chosen model is the power law, the log-log data should have a straight line representation.
  • In the previous sections, we looked for approximations of a function f j verifying q j ( t ) = t f j for t large enough. Actually, when real-world phenomena (such as the web or the whole English language) are considered, t is so large that it can be assumed infinite. In practice, we deal with J samples Q j , and, typically, the quantity j = 1 J j Q j is much smaller than t. So, we assume
    q j = E [ Q j ] = d f j , with j = 1 , , J ,
    where d is a suitable scaling factor. Note that Q j , being the number of items having degree j, is a nonnegative integer, while d f j is a real number which can be very small. The quantization phenomenon cannot be considered statistical noise (as done by some authors) but is an intrinsic characteristic of the sampled data. For example, if  q j = 10 3 , the corresponding values Q j are mostly 0 but sometimes 1 or 2. Obviously, the zeros become more and more probable until the last data are reached.
    In the log-log scale, the values Q j = 1 , 2 , are gathered in plateaus on the tail of the dataset. Figure 3 shows the base 10 log-log representation of the frequencies of two datasets described in the next section: a set of English words and a set of MovieLens ratings. The quantization phenomenon is evident.
  • A dequantization process can be accomplished by binning the data: the data values belonging to a given small interval (called a bin) are replaced by a value representative of that interval. When the binning is performed in the log-log scale, negative values might be generated. This procedure is essential to recover the asymptotic properties of the phenomenon and allows to reduce the size of data while performing some sort of smoothing. In Figure 4, the same data of Figure 3 are presented, together with the result of binning. It is clear that the binning reveals the different asymptotic behavior of the two data sets.

3.1. The Binning

We suggest the following logarithmic binning, which produces bins of equal width in the log-log scale.
Given τ > 1 , we consider the sequence h i = τ i 1 , i = 1 , , n + 1 , where n is such that h n J < h n + 1 . The ith bin is J i = [ h i , h i + 1 ) for i = 1 , , n . The set Y of the binned data is formed by the pairs ( x i , y i ) , where
x i = log b i , y i = log ( 1 s i j J i Q j ) , with b i = h i + h i + 1 2 , s i = h i + 1 h i .
If no point ( j , Q j ) exists with j J i , the pair ( x i , y i ) is discarded (this may happen for large i). Note that, because of the discarded pairs, the set Y might have size lower than n, but, for simplicity, we still denote by n the size of Y. In the experimentation, τ has been tuned through a preliminary processing.

3.2. The Fitting

The fitting procedure is performed in the log-log plane on the binned data
Y = { ( x i , y i ) } , i = 1 , , n .
Let g ^ ( z ) be the cubic-cut-off function defined in (20):
g ^ ( z ) = a 0 + a 1 z + a 2 z 2 + a 3 z 3 + a e exp ( z ) , where a e < 0 .
We compute
{ b 0 , , b e } = argmin a 0 , , a e i = 1 n y i g ^ ( x i ) 2 ,
imposing the constraint a e 0 . For the other functions of Section 2.5, we compute the fit (25) setting to zero some coefficients of g ^ ( z ) .
If b e < 0 , the solution is
g j = exp ( b 0 ) j b 1 exp ( b 2 log 2 j ) exp ( b 3 log 3 j ) exp ( b e j ) .
In some cases, the coefficient b e might be zero. The series j = 1 j g j is convergent for b e < 0 , or, for b 3 < 0 , when b e = 0 . The corresponding model ( p , f ) is derived according to (5):
θ = j = 1 j g j , f j = g j / θ , p j = i = j + 1 f i .
We can give a closed-form approximation of the sequence p j through the function π j defined in (24). We have already suggested that η coincides with the coefficient of the exponential term of f j , in the present case η = b e , but we still need to compute the function h ^ ( z ) defined in (23).
In analogy with what has been done for f ^ ( z ) , we try for h ^ ( z ) a polynomial regression with degree 3. So, we consider a subset of m n integers j i , i = 1 , , m , in  [ 1 , J ] , equispaced in the logarithmic scale, such that j 1 = 1 and j m = J . Then, setting x ^ i = log j i , and  y ^ i = log p j i , we solve the minimum problem
{ c 0 , , c 3 } = argmin h 0 , , h 3 i = 1 m y ^ i h ^ ( x ^ i ) b e exp ( x ^ i ) 2 , with h ^ ( x ) = r = 0 3 h r x r .
Replacing in (23), we get
π ^ ( z ) = c 0 + c 1 z + c 2 z 2 + c 3 z 3 + b e exp ( z ) , π j = exp ( c 0 ) j c 1 exp c 2 log 2 j exp c 3 log 3 j exp b e j .
A specific performance index ϵ p (31) controls the effectiveness of the similarity of π j to p j . A too large ϵ p would raise doubts on the approximation, possibly due to numerical instability in the computation of f j .

3.3. The Attachment Rule

Instead of computing directly δ j as the ratio between the sequences p j and f j for 1 j J , the sequence δ j can be approximated by a function ξ j obtained exploiting the closed-form approximation π j of p j :
ξ j = exp ( ξ ^ ( log j ) ) , where ξ ^ ( z ) = d 0 + d 1 z + d 2 z 2 + d 3 z 3 , d i = c i b i .
The error of this approximation is measured by a specific performance index ϵ δ (32). If ϵ δ is sufficiently small, the investigation of ξ j for 1 j J gives useful hints on δ j . The quantity
ν = min { k such that max j [ 2 , J ] ξ j / j k 1 }
satisfies
ξ j = s j j ν , where s j = ξ j / j ν , with 0 < s j 1 .
Then, we can assume s j as the probability for an attachment rule δ j on the whole interval [ 2 , J ] . The value j = 1 has been excluded from definition (29) because the maximum of ξ j / j k does not change when ξ j assumes its maximum in j = 1 . Of course, if the function ξ j / j ν is decreasing in [ 2 , J ] , the value ν obtained from (29) coincides with ν ^ = log 2 ξ 2 . The function s j takes the place of the coefficient s in (10). We call sublinear the attachment if ν < 1 , superlinear if ν > 1 , and pseudo-linear if ν = 1 .
The attachment exponent ν , as defined in (29), holds for the whole interval, but it depends excessively on the head of the dataset in which behavior, even though in agreement with our model, could generate a uselessly overestimated attachment rule. An attachment exponent less affected by the first points could be more indicative. To this aim, we restrict our computation of (29) to a subinterval which leaves out the first j min points (in our experimentation, we took j min = 20 ).
The quantity ν can be used as a possible numerical measure to discriminate different types of datasets.

3.4. Performance Indices

In the experimentation, the function g ^ ( z ) used for the fitting has been chosen among all the functions taken into consideration in the previous sections. Let g ^ ( H ) ( z ) , with  H { B , P , L , C , O } , denote one of the functions. The corresponding normalized f ^ ( H ) ( z ) are
  • the Beta function f ^ ( B ) ( z ) = f ^ ( z ) defined in (16),
  • the power law function f ^ ( P ) ( z ) defined in (17),
  • the log-normal function f ^ ( L ) ( z ) defined in (18),
  • the cut-off function f ^ ( C ) ( z ) defined in (19),
  • the cubic-cut-off function f ^ ( O ) ( z ) defined in (21).
Least squares procedures solve the minimization problem (25), except for the Beta function which requires a procedure of non linear minimization (we used a Nelder-Mead procedure). The quality of the fitting is measured by the NRMSE (normalized root-mean-square error)
ϵ ( H ) = 1 y max y min 1 n i = 1 n ( y i g ^ ( H ) ( x i ) ) 2 ,
where y min and y max are the minimum and the maximum of the values y j for j = 1 , , n . Besides the error ϵ ( H ) , the suitability of the model to the dataset can be measured by the scaling factor θ of (26). In the case of b e = 0 , if  d 3 > 0 , the series j = 1 j g j does not converge, and, in practice, θ is given a very large value. The same thing can also occur when the series is convergent, but numerical instability prevents a correct computation. When θ is too large, we judge the model to be inadequate for that dataset. The symbol in the tables of the next section identifies this case.
Two more performance indices have emerged in the presentation of the whole fitting procedure.
(1)
The quality of the approximation of p j by π j is measured by the NRMSE
ϵ p = 1 p max p min 1 m i = 1 m p j i π j i 2 ,
where p min and p max are the minimum and the maximum of the values p j i for i = 1 , , m .
(2)
A too large discrepancy between δ j and ξ j suggests that the similarity of the bases used for π ^ ( z ) , and f ^ ( z ) cannot be assumed. This is measured by the NRMSE
ϵ δ = 1 δ max δ min 1 m i = 1 m δ j i ξ j i 2 ,
where δ min and δ max are the minimum and the maximum of the values δ j i for i = 1 , , m .
These two indices ϵ p and ϵ δ have been evaluated for all the functions, but only the values obtained for the cubic-cut-off are reported in the next section.

4. Experiments

The experimentation has been performed with a 3.2 GHz 8-core Intel Xeon W processor machine using Mathematica TM version 12 and carried out on 21 datasets divided in three groups: scalar phenomena, directed graphs, and bipartite graphs. The code, together with the datasets not available elsewhere, can be downloaded from Reference [13]. For each dataset, the citation, a brief description, the number N of items, and the size S, equal to the total number of degrees, are given below.
Following the description, a first table summarizes the results of the experimentation. Columns 1–5 of the table show the errors of the solutions computed by the different procedures. The error is replaced by if the series j = 1 j g j does not converge. For the power law, this means that ρ < 2 , i.e., a well-defined mean does not exist. The error is replaced by an * if it exceeds by three times the best error for the same dataset. Columns 6, 7 list the indices ϵ p and ϵ δ of cubic-cut-off. Column 8 lists the exponent ν of the attachment rule defined in (29), where j [ j min , J ] , with  j min = 20 .
A second table gives the log-log representation of g ^ ( O ) ( z ) for some selected datasets. For these datasets, the base 10 log-log plots of the cubic-cut-off functions (solid line) are given, superimposed to the original data (gray points) and the binned data (black points). An integer i on the axis corresponds to 10 i in the linear scale.

4.1. Scalar Phenomena

The scalar phenomena are characterized by a single distribution of values. For each dataset, the file of the pairs ( j , Q j ) , where Q j is the frequency function defined in (1), is generated. The name of the file corresponds to the name of the dataset.
  • cities population [14]. The population of N cities obtained by Mathematica CityData feature on February 2020. N = 156 K , and S = 4.15 G .
  • english [15]. A large collection of English words obtained by joining a collection of Project Gutenberg texts and a collection of public USENET postings collected between October 2005 and January 2011. N = 14.1 M , and S = 30.7 G .
  • hollywood-2011 [16]. One of the most popular social dataset: the graph of movie actors. Nodes are actors, and two actors are joined by a link whenever they appeared in a movie together. Since outdegree and indegree coincide, from the point of view of the frequency analysis, this is considered a scalar phenomenon. N = 2.18 M , and S = 231 M .
The errors of the computed solutions are given in Table 1.
Two files have been selected: their log-log solutions g ^ ( O ) ( z ) are given in Table 2, and the log-log plots of the cubic-cut-off functions are given in Figure 5.

4.2. Directed Graphs

In directed graphs, the edges have an orientation, so there exist inlinks (pointing to a node) and outlinks (originating from a node). In this case, the degree of the node becomes, more specifically, the indegree, which counts the inlinks, and the outdegree, which counts outlinks. For each graph, two files are generated with the frequency function (2): the one containing the indegrees and the one containing the outdegrees. Their names correspond to the name of the graph with the suffix .i and .o, respectively.
These datasets, except steemit, can be downloaded from Reference [16], where they have been stored compressed using LLP + WebGraph [17,18].
  • clueweb12 [19]. The web graph underlying the ClueWeb12, a dataset created to support research on information retrieval and related human language technologies. N = 978 M , and S = 43.6 G .
  • eu-2015 [20] The web graph of a large snapshot of the EU countries taken in 2015 by BUbiNG starting from the site http://europa.eu/. The maximum number of nodes per host was set to 10M (and never reached). N = 1.07 G , and S = 92.9 G .
  • Wikipedia graphs [21]. The node connections for the following versions of Wikipedia: English (enwiki-2018) N = 5.62 M and S = 134 . M , German (dewiki-2013) N = 1.53 M and S = 38.3 M , French (frwiki-2013) N = 1.35 M and S = 35.7 M , Spanish (eswiki-2013) N = 973 K and S = 24 M , and Italian (itwiki-2013) N = 1.02 M , and S = 26.6 M .
  • hu-tel-2006 [16]. The social graph built from the detailed call record of Hungarian Telekom for an eight-month time frame in 2006. Measurements were performed by the Hungarian Academy of Sciences. N = 2.32 M , and S = 48.4 M .
  • steemit [22]. The relations graph of Steemit, a blockchain-based blogging and social media website. N = 1.15 M , and S = 98.1 M .
  • twitter-2010 [23]. The website, owned and operated by Twitter, Inc., which offers a social networking and microblogging service. Nodes are users, and there is an arc from x to y if y is a follower of x, i.e., the arcs follow the direction of the tweet transmission. N = 41.6 M , and S = 1.51 G .
The errors of the computed solutions are given in Table 3.
Four files have been selected: their log-log solutions g ^ ( O ) ( z ) are given in Table 4. Note that eu2015.i lacks the exponential term, and b 3 is so small that the cubic-cut-off solution is nearly equal to the log-normal solution, as confirmed by the same error in Table 3.
The log-log plots of the cubic-cut-off functions are given in Figure 6 and Figure 7.

4.3. Bipartite Graphs

Bipartite graphs contain two types of nodes, active and passive. The edges connect an active node with a passive one. As in the previous case, for each graph, two files are generated with the frequency function (2): the one with the suffix .i contains the indegrees (i.e., the degrees of the passive nodes), and the one with the suffix .o contains the outdegrees (i.e., the degrees of the active nodes).
Most of the considered graphs are rating networks between persons and items they have rated. The ratings values are ignored, and only the information whether a person has rated an item is retained.
  • book crossing [24]. Collected by Ziegler in a 4-week crawl (August/September 2004) from the Book-Crossing community. It contains the ratings about 271,379 books. N = 105 K , and S = 1.15 M .
  • fine foods [25]. The dataset of the reviews of fine foods from Amazon. The data span a period of more than 10 years, up to October 2012. N = 74.2 K , and S = 568 K .
  • last.fm. A large database of listening data crawled by [26] using the last.fm API. There were considered both relations user-song ( N = 211 K and S = 1.29 G ) and relations user-song weighted with the number of plays ( N = 211 K , and S = 4.96 G ).
  • movielens [27]. The dataset describes 5-star rating and free-text tagging activity from MovieLens, a movie recommendation service. It contains 25 M ratings. These data were created between 9 January 1995 and 21 November 2019. N = 162 K , and S = 25 M .
  • supermarket. A small database of supermarket purchases collected by [28]. There were considered both relations user-product ( N = 60.4 K and S = 24.6 M ) and the relations user-product weighted with the number of purchases ( N = 60.4 K , and S = 107 M ).
  • Yahoo! artists [29]. The artists ratings collected from the Yahoo! Webscope dataset R1. This dataset represents a (anonymized) snapshot of the Yahoo! Music community’s preferences for various musical artists, collected in one month sometime prior to March 2004. N = 1.95 M , and S = 116 M .
The errors of the computed solutions are given in Table 5.
Four files have been selected: their log-log solutions g ^ ( O ) ( z ) are given in Table 6, and the log-log plots of the cubic-cut-off functions are given in Figure 8 and Figure 9.

4.4. Comments

The first thing we note from Table 1, Table 3, and Table 5 is that cubic-cut-off mainly outperforms the other procedures, which could be so ranked: log-normal, Beta, cut-off, power law. The winning point of cubic-cut-off and log-normal is their better ability in adapting to the bending of the head, but log-normal behaves worse than cubic-cut-off in the tail because of the lack of the exponential term. The relevance of logarithmic terms is confirmed by the fact that, only in a small number of cases, cut-off reaches the performance of cubic-cut-off. The small values of ϵ p e ϵ δ provide an indirect proof of the validity of the cubic-cut-off model.
From Table 3, we note a characteristic behavior of function ξ j of the cubic-cut-off for most directed graphs, in particular for Wikipedia graphs: typically, the indegree files have a larger attachment exponent than outdegree files. This agrees with the reasonable idea that the outlink processes are independent from the degree of the node, while the inlink process rely more on the degree of the node.
On the contrary, the difference between indegree and outdegree files in bipartite graphs appears reversed, pointing out the active role of a person in choosing a particular item. This is evident, for example, in the case of the supermarket datasets. We could try an explanation for these outcomes: it could be the result of some aggressive commercial policy which directs the purchases toward more advertised products. It is worth noting that cubic-cut-off succeeds in coping, even with the particularly difficult datasets last.fm.o and last.fmW.o, which exhibit a very messy head. In these cases, since the resulting attachment rule is conditioned by dozens of head points, it seems appropriate to let j min = 100 , thus reducing the exponent at values near 2.
A large attachment exponent appears for the citiesPopulation dataset, as well, pointing out the recognized great attractiveness of the most important cities of the world.
Finally, for many considered datasets, s j results decreasing in the tail, suggesting that the attachment rule might get weaker progressively when the items have a very large degree. If we associate the degree of an item to its age (as it is often made), in the sense that an item with a larger degree is assumed to be older, this weakening behavior could be considered as a possible indicator of a phenomenon of obsolescence.

5. Conclusions and Future Work

In this paper, a model for frequency analysis of systems representing multi-scale real-world phenomena has been proposed. At its basis, a discrete-time stochastic process leads to a steady state solution ruling the attachment policy. The attachment rule, which in the original mixed model is linear, has been enriched for including elements of the exponential cut-off model and of the log-normal model.
The proposed model, called cubic-cut-off, has been applied to a large number of datasets and results to be more effective than other models, like the widely applied log-normal and cut-off, which, in some cases, are unable to give acceptable approximations, as clearly appears from the inspection of Table 1, Table 3 and Table 5, where the cubic-cut-off is compared with the Beta function, the power law, the log-normal, and the cut-off.
In a few cases, its behavior is only a little better than the log-normal, showing that the cubic and exponential terms added to log-normal have a small influence, but, in most cases, the presence of these terms is essential to obtain good results.
The frequency analysis we performed in this paper applies to a network modeling based on graph representations as a discrete structure. The model we proposed belongs to the class of parametric models, where some finite set of parameters is assumed. Alternatively, the class of non-parametric models, where an infinite set of parameters is assumed, can be taken into consideration; see, for example, Reference [30], where a Bayesian non-parametric model for random graphs is proved to exhibit a power-law behavior, and a general framework for bipartite graphs, directed multigraphs, and undirected graphs is described. In future research, we are interested in studying non-parametric models applied to networks exhibiting peculiar behaviors, like the ones we considered in this paper.

Author Contributions

All the authors have contributed substantially and in equal measure to all the phases of the work reported. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Barabasi, A.L. Network Science; Cambridge University Press: Cambridge, UK, 2016. [Google Scholar] [CrossRef]
  2. Mitzenmacher, M. A Brief History of Generative Models for Power Law and Lognormal Distributions. Internet Math. 2003, 1, 226–251. [Google Scholar] [CrossRef] [Green Version]
  3. Adamic, L.A. Zipf, Power-Laws, and Pareto—A Ranking Tutorial; Information Dynamics Lab, HP Labs: Palo Alto, CA, USA, 2012; Available online: http://www.hpl.hp.com/research/idl/papers/ranking/ranking.html (accessed on 2 December 2020).
  4. Caldarelli, G.; De Los Rios, P.; Laura, L.; Leonardi, S.; Millozzi, S. A Study of Stochastic Models for the Web Graph; Technical Report 04-03; Dip. di Informatica e Sistemistica, Universita’ di Roma “La Sapienza”: Rome, Italy, 2003. [Google Scholar]
  5. Simon, H.A. On a Class of Skew Distribution Functions. Biometrika 1955, 42, 425–440. [Google Scholar] [CrossRef]
  6. Cooper, C.; Frieze, A.M. A general model of undirected web graphs. In European Symposium on Algorithms; Springer: Berlin/Heidelberg, Germany, 2001; pp. 500–511. [Google Scholar]
  7. Dorogovtsev, S.; Mendes, J.; Samukhin, A. Structure of Growing Networks: Exact Solution of the Barabasi-Albert’s model. Phys. Rev. Lett. 2000, 85, 4633–4636. [Google Scholar] [CrossRef] [Green Version]
  8. Pennock, D.M.; Flake, G.W.; Lawrence, S.; Glover, E.J.; Giles, C.L. Winners don’t take all: Characterizing the competition for links on the web. Proc. Natl. Acad. Sci. USA 2002, 99, 5207–5211. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  9. Dereich, S.; Mörters, P. Random Networks with Sublinear Preferential Attachment: Degree Evolutions. Electron. J. Probab. 2009, 14, 1222–1267. Available online: https://projecteuclid.org/euclid.ejp/1464819504 (accessed on 11 December 2020). [CrossRef]
  10. Kunegis, J.; Blattner, M.; Moser, C. Preferential Attachment in Online Networks: Measurement and Explanations. arXiv 2013, arXiv:1303.6271. [Google Scholar]
  11. Abramowitz, M.; Stegun, I. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, National Bureau of Standards, 10th Printing; National Bureau of Standards (DOC): Washington, DC, USA, 1972.
  12. Beta Function. Available online: https://en.wikipedia.org/wiki/Beta_function (accessed on 2 December 2020).
  13. Supplementary Data for This Paper. Available online: http://pages.di.unipi.it/romani/MDPIdata.zip (accessed on 9 December 2020).
  14. Wolfram Language & System Documentation Center. Available online: https://reference.wolfram.com/language/ref/CityData.html (accessed on 4 December 2020).
  15. Project Gutenberg Literary Archive. Available online: ftp://mirrors.pglaf.org/mirrors/gutenberg-iso/pgdvd042010.iso (accessed on 4 December 2020).
  16. Laboratory for Web Algorithmics. Available online: http://law.di.unimi.it/datasets.php (accessed on 4 December 2020).
  17. Boldi, P.; Vigna, S. The Web Graph Framework I: Compression Techniques. In Proceedings of the 13th International Conference on World Wide Web, New York, NY, USA, 17–20 May 2004; ACM Press: New York, NY, USA, 2004; Volume 99, pp. 595–601. Available online: http://law.di.unimi.it/datasets.php (accessed on 4 December 2020).
  18. Boldi, P.; Rosa, M.; Santini, M.; Vigna, S. Layered Label Propagation: A MultiResolution Coordinate-Free Ordering for Compressing Social Networks. In Proceedings of the 20th International Conference on World Wide Web, Hyderabad, India, 28 March–1 April 2011; Srinivasan, S., Ramamritham, K., Kumar, A., Ravindra, M.P., Bertino, E., Kumar, R., Eds.; ACM Press: New York, NY, USA, 2011; pp. 587–596. [Google Scholar]
  19. ClueWeb12 Web Graph. Available online: http://www.lemurproject.org/clueweb12/webgraph.php/ (accessed on 4 December 2020).
  20. Boldi, P.; Marino, A.; Santini, M.; Vigna, S. BUbiNG: Massive Crawling for the Masses. In Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web, Seoul, Korea, 7–11 April 2014; pp. 227–228. [Google Scholar]
  21. Boldi, P.; Codenotti, B.; Santini, M.; Vigna, S. Ubicrawler: A Scalable Fully Distributed Web Crawler. Software Pract. Exp. 2004, 34, 711–726. [Google Scholar] [CrossRef]
  22. Guidi, B.; Michienzi, A.; Ricci, L. A graph-based socio-economic analysis of Steemit. IEEE Trans. Comput. Soc. Syst. Submitted to.
  23. Kwak, H.; Lee, C.; Park, H.; Moon, S. What is Twitter, a Social Network or a News Media? In Proceedings of the 19th International World Wide Web (WWW) Conference, Raleigh, NC, USA, 26–30 April 2010; ACM Press: New York, NY, USA, 2010; pp. 591–600. [Google Scholar] [CrossRef] [Green Version]
  24. Ziegler, C.N.; McNee, S.M.; Konstan, J.A.; Lausen, G. Improving Recommendation Lists Through Topic Diversification. In Proceedings of the 14th International World Wide Web Conference (WWW ’05), Chiba, Japan, 10–14 May 2005. [Google Scholar]
  25. McAuley, J.; Leskovec, J. From Amateurs to Connoisseurs: Modeling the Evolution of User Expertise through Online Reviews. WWW 2013. Available online: https://snap.stanford.edu/data/web-FineFoods.html (accessed on 4 December 2020).
  26. Bradan, A.L. Forecast Emerging Artists Success on Last.fm Music Service: A Data-Driven Study. Master’s Thesis, University of Pisa, Pisa, Italy, 2020. [Google Scholar]
  27. Movie Lens. Available online: https://grouplens.org/datasets/movielens/ (accessed on 4 December 2020).
  28. Pennacchioli, D.; Coscia, M.; Rinzivillo, S.; Pedreschi, D.; Giannotti, F. Explaining the product range effect in purchase data. In Proceedings of the 2013 IEEE International Conference on Big Data, Big Data 2013, Santa Clara, CA, USA, 6–9 October 2013; pp. 648–656. [Google Scholar] [CrossRef]
  29. Yahoo! Webscope Dataset ydata-ymusic-user-artist-ratings-v1_0 Yahoo! Music User Ratings of Musical Artists, Version 1.0. Available online: http://webscope.sandbox.yahoo.com/catalog.php?datatype=r (accessed on 11 December 2020).
  30. Caron, F.; Fox, E.B. Sparse Graphs using Exchangeable Random Measures. J. R. Stat. Soc. Ser. B 2017, 79, 1295–1366. Available online: https://rss.onlinelibrary.wiley.com/doi/full/10.1111/rssb.12233 (accessed on 4 December 2020). [CrossRef] [PubMed] [Green Version]
Figure 1. Log-log plots of f j (solid line) and of v j (dashed line), in the cases α = 0.3 , β = 0.3 (left) and α = 0.5 , β = 0.9 (right).
Figure 1. Log-log plots of f j (solid line) and of v j (dashed line), in the cases α = 0.3 , β = 0.3 (left) and α = 0.5 , β = 0.9 (right).
Information 11 00580 g001
Figure 2. Log-log plots of f j ( P ) (solid line), f j ( L ) (dotted line), f j ( C ) (dotted-dashed line), and f j ( O ) (dashed line).
Figure 2. Log-log plots of f j ( P ) (solid line), f j ( L ) (dotted line), f j ( C ) (dotted-dashed line), and f j ( O ) (dashed line).
Information 11 00580 g002
Figure 3. Frequencies of English words (on the left) and of MovieLens ratings (on the right).
Figure 3. Frequencies of English words (on the left) and of MovieLens ratings (on the right).
Information 11 00580 g003
Figure 4. Binned frequencies of English words (on the left) and of MovieLens ratings (on the right).
Figure 4. Binned frequencies of English words (on the left) and of MovieLens ratings (on the right).
Information 11 00580 g004
Figure 5. Log-log solutions of citiesPopulation (on the left) and of english (on the right).
Figure 5. Log-log solutions of citiesPopulation (on the left) and of english (on the right).
Information 11 00580 g005
Figure 6. Log-log solutions of eu2015.i (on the left) and of eu2015.o (on the right).
Figure 6. Log-log solutions of eu2015.i (on the left) and of eu2015.o (on the right).
Information 11 00580 g006
Figure 7. Log-log solutions of hutel2006.i (on the left) and of hutel2006.o (on the right).
Figure 7. Log-log solutions of hutel2006.i (on the left) and of hutel2006.o (on the right).
Information 11 00580 g007
Figure 8. Log-log solutions of last.fm.i (on the left) and of last.fm.o (on the right).
Figure 8. Log-log solutions of last.fm.i (on the left) and of last.fm.o (on the right).
Information 11 00580 g008
Figure 9. log-log solutions of supermarketW.i (on the left) and of supermarketW.o (on the right).
Figure 9. log-log solutions of supermarketW.i (on the left) and of supermarketW.o (on the right).
Information 11 00580 g009
Table 1. Errors and attachment exponents for scalar phenomena.
Table 1. Errors and attachment exponents for scalar phenomena.
File ϵ ( B ) ϵ ( P ) ϵ ( L ) ϵ ( C ) ϵ ( O ) ϵ p ϵ δ ν
citiesPopulation0.0150.017*0.0100.0810.0262.71
english*0.0100.0120.0050.0160.0041.17
hollywood2011***0.0070.0430.0371.28
* The symbol is used to indicate that there is not element in this category.
Table 2. Solutions of two selected scalar phenomena.
Table 2. Solutions of two selected scalar phenomena.
citiesPopulation 1.05 + 2.690 z 0.358 z 2 + 0.009 z 3 5.9 × 10 8 e z
english 16.08 1.840 z + 0.041 z 2 0.002 z 3
Table 3. Errors and attachment exponents for directed graphs.
Table 3. Errors and attachment exponents for directed graphs.
File ϵ ( B ) ϵ ( P ) ϵ ( L ) ϵ ( C ) ϵ ( O ) ϵ p ϵ δ ν
clueweb12.i0.0240.0260.0260.0180.0110.0581.09
clueweb12.o0.0650.0980.0480.0390.0330.0470.0511.12
eu2015.i0.0330.0440.0180.0410.0180.0010.0191.18
eu2015.o0.065*0.0430.0510.0340.0190.0111.34
enwiki2018.i0.013*0.008*0.0060.0090.0161.03
enwiki2018.o0.020*0.022*0.0090.0600.0260.96
dewiki2013.i0.014*0.0120.0250.0110.0040.0111.04
dewiki2013.o0.027*0.026*0.0180.0630.0370.96
frwiki2013.i0.012*0.0110.0200.0090.0100.0161.03
frwiki2013.o0.023*0.028*0.0120.0710.0311.01
eswiki2013.i0.0120.0190.0120.0140.0090.0190.0191.00
eswiki2013.o0.0730.1150.0600.0870.0500.1080.0610.90
itwiki2013.i0.0160.0260.0140.0170.0110.0140.0151.01
itwiki2013.o0.044*0.023*0.0170.0560.0300.98
hutel2006.i0.060**0.0220.0920.055 1.06
hutel2006.o0.028*0.033*0.0190.0720.0460.91
steemit.i0.0260.014*0.0130.0010.0011.24
steemit.o0.0220.0170.0230.0150.0130.0191.19
twitter2010.i0.0250.0430.0180.037
twitter2010.o0.0190.0250.0230.0250.0170.0160.0421.04
* The symbol is used to indicate that there is not element in this category.
Table 4. Solutions of four selected directed graphs.
Table 4. Solutions of four selected directed graphs.
eu2015.i 19.50 0.987 z 0.064 z 2 0.00057 z 3
eu2015.o 15.59 + 1.025 z 0.317 z 2 + 0.008 z 3 2.3 × 10 3 e z
hutel2006.i 6.77 + 5.404 z 1.710 z 2 + 0.111 z 3 3.0 × 10 4 e z
hutel2006.o 7.93 + 3.928 z 1.220 z 2 + 0.067 z 3 4.2 × 10 4 e z
Table 5. Errors and attachment exponents for bipartite graphs.
Table 5. Errors and attachment exponents for bipartite graphs.
File ϵ ( B ) ϵ ( P ) ϵ ( L ) ϵ ( C ) ϵ ( O ) ϵ p ϵ δ ν
bookCrossing.i0.0300.0380.0280.0350.0280.0010.0010.90
bookCrossing.o0.0260.0350.0210.0270.0200.0060.0031.06
fineFoods.i0.0390.0430.0400.0410.0380.0130.0160.87
fineFoods.o0.040*0.0340.0230.0140.0280.0570.99
last.fm.i**0.0060.0050.0290.0201.15
last.fm.o*0.1050.0700.0350.2600.1683.33
last.fm W.i***0.0020.0250.0261.22
last.fm W.o0.1360.0860.1410.0630.1830.0643.34
movieLens.i**0.0060.0040.0120.0071.33
movieLens.o0.0290.0650.0340.056
supermarket.i*0.0300.0270.0130.0090.0121.99
supermarket.o***0.0170.1340.1472.03
supermarketW.i*0.022*0.0110.0110.0102.02
supermarketW.o**0.0120.0040.0380.0482.06
yahooArtists.i0.0360.0320.0210.0180.0180.0161.34
yahooArtists.o0.0810.0970.0840.0920.0770.0740.0241.09
* The symbol is used to indicate that there is not element in this category.
Table 6. Solutions of four selected bipartite graphs.
Table 6. Solutions of four selected bipartite graphs.
last.fm.i 14.76 1.418 z 0.027 z 2 + 0.001 z 3 2.3 × 10 6 e z
last.fm.o 4.83 2.481 z + 0.622 z 2 0.043 z 3 5.3 × 10 6 e z
supermarketW.i 3.04 0.026 z 0.077 z 2 + 0.001 z 3 1.9 × 10 6 e z
supermarketW.o 5.38 + 0.257 z 0.194 z 2 + 0.016 z 3 5.2 × 10 4 e z
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Favati, P.; Lotti, G.; Menchi, O.; Romani, F. A Model for the Frequency Distribution of Multi-Scale Phenomena. Information 2020, 11, 580. https://doi.org/10.3390/info11120580

AMA Style

Favati P, Lotti G, Menchi O, Romani F. A Model for the Frequency Distribution of Multi-Scale Phenomena. Information. 2020; 11(12):580. https://doi.org/10.3390/info11120580

Chicago/Turabian Style

Favati, Paola, Grazia Lotti, Ornella Menchi, and Francesco Romani. 2020. "A Model for the Frequency Distribution of Multi-Scale Phenomena" Information 11, no. 12: 580. https://doi.org/10.3390/info11120580

APA Style

Favati, P., Lotti, G., Menchi, O., & Romani, F. (2020). A Model for the Frequency Distribution of Multi-Scale Phenomena. Information, 11(12), 580. https://doi.org/10.3390/info11120580

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop