Motif based hierarchical random graphs: structural properties and critical points of an Ising model
A class of random graphs is introduced and studied. The graphs are constructed in an algorithmic way from five motifs which were found in [Milo R., Shen Orr S., Itzkovitz S., Kashtan N., Chklovskii D., Alon U., Science, 2002, 298, 824 – 827]. The construction scheme resembles that used in [Hinczewsk...
Збережено в:
Дата: | 2011 |
---|---|
Автори: | , |
Формат: | Стаття |
Мова: | English |
Опубліковано: |
Інститут фізики конденсованих систем НАН України
2011
|
Назва видання: | Condensed Matter Physics |
Онлайн доступ: | http://dspace.nbuv.gov.ua/handle/123456789/119972 |
Теги: |
Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
|
Назва журналу: | Digital Library of Periodicals of National Academy of Sciences of Ukraine |
Цитувати: | Motif based hierarchical random graphs: structural properties and critical points of an Ising model / Monika Kotorowicz, Yuri Kozitsky // Condensed Matter Physics. — 2011. — Т. 14, № 1. — С. 13801: 1-18. — Бібліогр.: 30 назв. — англ. |
Репозитарії
Digital Library of Periodicals of National Academy of Sciences of Ukraineid |
irk-123456789-119972 |
---|---|
record_format |
dspace |
spelling |
irk-123456789-1199722017-06-11T03:04:03Z Motif based hierarchical random graphs: structural properties and critical points of an Ising model Kotorowicz, Monika Kozitsky, Yuri A class of random graphs is introduced and studied. The graphs are constructed in an algorithmic way from five motifs which were found in [Milo R., Shen Orr S., Itzkovitz S., Kashtan N., Chklovskii D., Alon U., Science, 2002, 298, 824 – 827]. The construction scheme resembles that used in [Hinczewski M., A. Nihat Berker, Phys. Rev. E, 2006, 73, 066126], according to which the short-range bonds are non-random, whereas the long-range bonds appear independently with the same probability. A number of structural properties of the graphs have been described, among which there are degree distributions, clustering, amenability, small-world property. For one of the motifs, the critical point of the Ising model defined on the corresponding graph has been studied. Вводиться i вивчається клас випадкових графiв, збудованих в алгоритмiчний спосiб з п’яти мотивiв, знайдених у [Milo R., Shen-Orr S., Itzkovitz S., Kashtan N., Chklovskii D., Alon U., Science, 2002, 298, 824]. Конструкцiйна схема нагадує схему, застосовану у [Hinczewski M., A. Nihat Berker, Phys. Rev. E, 2006, 73, 066126], згiдно з якою короткосяжнi ребра є невипадковi, тодi як довгосяжнi ребра виникають незалежно iз однаковою ймовiрнiстю. Описано ряд структурних властивостей графiв, серед яких є розподiл ступенiв, кластернiсть, аменабiльнiсть, властивiсть тiсного свiту. Для одного з мотивiв вивчається критична точка моделi Iзiнга, визначеної на вiдповiдному графi. 2011 Article Motif based hierarchical random graphs: structural properties and critical points of an Ising model / Monika Kotorowicz, Yuri Kozitsky // Condensed Matter Physics. — 2011. — Т. 14, № 1. — С. 13801: 1-18. — Бібліогр.: 30 назв. — англ. 1607-324X PACS: 89.75.Fb, 89.75.Kd, 05.10.Cc, 05.70.Jk DOI:10.5488/CMP.14.13801 arXiv:1106.4399 http://dspace.nbuv.gov.ua/handle/123456789/119972 en Condensed Matter Physics Інститут фізики конденсованих систем НАН України |
institution |
Digital Library of Periodicals of National Academy of Sciences of Ukraine |
collection |
DSpace DC |
language |
English |
description |
A class of random graphs is introduced and studied. The graphs are constructed in an algorithmic way from five motifs which were found in [Milo R., Shen Orr S., Itzkovitz S., Kashtan N., Chklovskii D., Alon U., Science, 2002, 298, 824 – 827]. The construction scheme resembles that used in [Hinczewski M., A. Nihat Berker, Phys. Rev. E, 2006, 73, 066126], according to which the short-range bonds are non-random, whereas the long-range bonds appear independently with the same probability. A number of structural properties of the graphs have been described, among which there are degree distributions, clustering, amenability, small-world property. For one of the motifs, the critical point of the Ising model defined on the corresponding graph has been studied. |
format |
Article |
author |
Kotorowicz, Monika Kozitsky, Yuri |
spellingShingle |
Kotorowicz, Monika Kozitsky, Yuri Motif based hierarchical random graphs: structural properties and critical points of an Ising model Condensed Matter Physics |
author_facet |
Kotorowicz, Monika Kozitsky, Yuri |
author_sort |
Kotorowicz, Monika |
title |
Motif based hierarchical random graphs: structural properties and critical points of an Ising model |
title_short |
Motif based hierarchical random graphs: structural properties and critical points of an Ising model |
title_full |
Motif based hierarchical random graphs: structural properties and critical points of an Ising model |
title_fullStr |
Motif based hierarchical random graphs: structural properties and critical points of an Ising model |
title_full_unstemmed |
Motif based hierarchical random graphs: structural properties and critical points of an Ising model |
title_sort |
motif based hierarchical random graphs: structural properties and critical points of an ising model |
publisher |
Інститут фізики конденсованих систем НАН України |
publishDate |
2011 |
url |
http://dspace.nbuv.gov.ua/handle/123456789/119972 |
citation_txt |
Motif based hierarchical random graphs: structural
properties and critical points of an Ising model
/ Monika Kotorowicz, Yuri Kozitsky // Condensed Matter Physics. — 2011. — Т. 14, № 1. — С. 13801: 1-18. — Бібліогр.: 30 назв. — англ. |
series |
Condensed Matter Physics |
work_keys_str_mv |
AT kotorowiczmonika motifbasedhierarchicalrandomgraphsstructuralpropertiesandcriticalpointsofanisingmodel AT kozitskyyuri motifbasedhierarchicalrandomgraphsstructuralpropertiesandcriticalpointsofanisingmodel |
first_indexed |
2025-07-08T17:00:13Z |
last_indexed |
2025-07-08T17:00:13Z |
_version_ |
1837098879105892352 |
fulltext |
Condensed Matter Physics 2011, Vol. 14, No 1, 13801: 1–18
DOI:10.5488/CMP.14.13801
http://www.icmp.lviv.ua/journal
Motif based hierarchical random graphs: structural
properties and critical points of an Ising model ∗
Monika Kotorowicz†, Yuri Kozitsky‡
Institute of Mathematics, Maria Curie-Skłodowska University, Lublin, Poland
Received March 15, 2010, in final form June 7, 2010
A class of random graphs is introduced and studied. The graphs are constructed in an algorithmic way from
five motifs which were found in [Milo R., Shen-Orr S., Itzkovitz S., Kashtan N., Chklovskii D., Alon U., Science,
2002, 298, 824–827]. The construction scheme resembles that used in [Hinczewski M., A. Nihat Berker, Phys.
Rev. E, 2006, 73, 066126], according to which the short-range bonds are non-random, whereas the long-range
bonds appear independently with the same probability. A number of structural properties of the graphs have
been described, among which there are degree distributions, clustering, amenability, small-world property. For
one of the motifs, the critical point of the Ising model defined on the corresponding graph has been studied.
Key words: amenability, degree distribution, clustering, small-world graph, Ising model, critical point
PACS: 89.75.Fb, 89.75.Kd, 05.10.Cc, 05.70.Jk
1. Introduction and setup
A vast variety of large systems occurring in nature and society have a very complicated topolog-
ical structure. These are the Internet, the World Wide Web, citation, neural, and social networks,
etc. In view of the complex topology and unknown organizing principles, the networks are often
modeled as random graphs. A random graph with a given node set V is a graph in which for a given
pair i, j ∈ V , the bond 〈i, j〉 appears at random. The study of random graphs has been originated
by P. Erdős and A. Rényi, who were the first to introduce such graphs in [1, 2]. In the Erdős-Rényi
random graph model, denoted by Gn,p , the number of nodes is n, and the bonds between distinct
nodes appear independently1 with the same probability p. An important characteristic of a graph
is the node degree, which is the number of bonds attached thereat. In Gn,p , it is a random variable,
and all such variables are independent and have the same probability distribution. Namely, the
probability that the degree of a given node is k is given by the Bernoulli law
Pn(k) =
(
n− 1
k
)
pk(1− p)n−1−k , k = 0, 1, . . . , n− 1. (1)
For random graphs, the most interesting questions refer to their asymptotic properties in the limit
n → +∞. To get nontrivial answers to such questions one allows the parameters to depend on n.
For pn = c/n, the limit of (1) is the Poisson law
P (k) = cke−c/k! , k ∈ N0. (2)
However, for irregular complex networks, the random graph Gn,p is not a good model since in
the most of such networks the degree distribution is essentially non-Poissonian. Many real world
∗This work was supported by the DFG through the project 436 POL 125/0–1 as well as through SFB 701:
“Spektrale Strukturen und Topologische Methoden in der Mathematik”. Yuri Kozitsky was also supported by
TODEQ MTKD–CT–2005–030042.
†E-mail: monika@hektor.umcs.lublin.pl
‡E-mail: jkozi@hektor.umcs.lublin.pl
1C.f., however, the discussion in [3].
c© M. Kotorowicz, Yu. Kozitsky 13801-1
http://dx.doi.org/10.5488/CMP.14.13801
http://www.icmp.lviv.ua/journal
M. Kotorowicz, Yu. Kozitsky
networks, e.g. the WWW, are characterized by power-law node degree distributions, which have
the form P (k) = Ck−γ , γ > 1, typical for the so-called scale-free graphs.
Another important parameter characterizing a random graph is the clustering coefficient, which
is the probability that two nodes are neighbors given they have a common neighbor. Clearly, in
Gn,p this probability is p, and is the same independently of whether or not the nodes have a com-
mon neighbor. Real world networks usually manifest strong clustering, which once more indicates
that Erdős-Rényi type random graphs are not appropriate as their models. In [4], D.J. Watts and
H. Strogatz proposed another type of random graphs, in which the mentioned disadvantage is
overcome. It should be noted, however, that such graphs do not have power law node degree distri-
butions. The next step beyond the Erdős-Rényi model was done by A.-L. Barabási and R. Albert
in [5]. In their model, the preferential attachment principle has been employed, typical for many
real networks (the Internet, citation and social networks). According to this principle, the more
connected a node is, the more likely it receives a new bond. The construction of the Barabási-
Albert model starts from an initial graph with m0 > 2 nodes (neither can be isolated). At each
step, one adds a new node and connects it to the existing nodes. The probability pi that the new
node is connected to node i is proportional to the degree ni of that node, that is, pi = ni/(
∑
j nj).
Many of the complex networks occurring in nature contain characteristic patterns, recurring
much more frequently than the other ones. They are called network motifs, see [6–11]. Different
networks may have different motifs, and motifs in turn can characterize the networks. For instance,
in biological regulation networks it has been experimentally demonstrated that each of the mo-
tifs can perform a key information processing function, see [8]. In [10], the authors introduced a
random graph model based on some geometric principles (constraints). Then, they compared the
appearance of eight elementary three- and four-node patterns in their model with the same charac-
teristics of the Erdős-Rényi random graph. It turned out that five of these patterns are motifs for
their model, but not for the Erdős-Rényi random graph, see figure 1 below and table 1 in [10]. For
J
J
J
J
J
J
J
J
�
�
�
�
�
�
�
�
@
@
@
@
Figure 1. Three and four node motifs M1,M2,M3,M4,M5 found in [10].
another random graph model, the appearance of the same eight patterns was also studied in [11].
Note that among these patterns, only M1 and M5 correspond to complete graphs (each node is a
neighbor to every other node).
One of the ways to get information about infinite graphs, also random ones, is to study the
properties of certain models of statistical physics defined thereon. The most popular ones are the
Ising and Potts models, as well as the models of bond and site percolation, see [12]. On the other
hand, in statistical physics certain graphs are employed to mimic a crystal lattice, for which the
critical-point behavior of the Ising model can be described in an explicit and rigorous way. These are
the so-called hierarchical lattices introduced in [13]. Such lattices are defined in a rather algorithmic
way by means of the basic pattern, e.g., by a “diamond”, which is the pattern M3 depicted in
figure 1. A mathematical description of the Gibbs states of the Ising model on such graphs was
done by P.M. Bleher and E. Žalys in [14, 15]. M. Hinczewski and A. Nihat Berker [16] studied
the critical-point properties of the Ising model on the diamond hierarchical lattice ‘decorated’ by
additional bonds, which appear at random. In the present paper, we follow the way suggested in [16]
and introduce hierarchical graphs constructed by means of the motifs shown in figure 1, decorated
by additional bonds which appear at random and repeat, in a way, the corresponding motif. We
analyse some of their characteristics, such as the average degree, the node degree distribution,
amenability, the small-world property, as well as the critical-point properties of the Ising model.
This study of ours is a continuation of [17], where the graph based on M1 was introduced by one
of us. Note that our hierarchical graphs also found applications in cryptography, see [18].
13801-2
Motif based hierarchical random graph
2. The graphs: construction and structural properties
2.1. The construction: informal description
As is typical for hierarchical graphs, e.g., for hierarchical lattices in [13, 16], the construction is
carried out in an algorithmic way: at k-th level, k ∈ N, one produces a subgraph, say Λk , which is
then used as a construction element for producing Λk+1 . The procedure is the same at each level,
and the starting element is obtained from the corresponding motif. Let us illustrate this for the
simplest case based on the motif M1 . First we label the nodes of M1 by a, b, and c, as it is shown
in figure 2, and obtain Λ1 — the triangle. Then we take three such graphs and label them by the
same labels. As a result, each of the triangles has nodes of two kinds: one node the label of which
coincides with the triangle label (e.g., node a in triangle a), and two nodes with non-coinciding
labels. Thereafter, the triangles are glued up according to the following rule: node c of triangle a
is glued up with node a of triangle c, ect. The nodes with the coinciding labels remain untouched.
These are the so-called external nodes of Λ2 . The remaining nodes are called internal. The bonds
of the initial triangles turn into the bonds of Λ2 . We call them basic bonds; they are depicted by
solid lines. At the next stage of the first step, we add the bonds connecting the external nodes in
the same way as it is in the motif M1 . Such bonds are depicted by dotted lines and are called
decorations. As a result, we obtain the graph Λ2 , which has six basic bonds and three decorations,
three external and three internal nodes. Then we repeat the same procedure — take three copies
of Λ2 , label them by a, b, and c, and divide their external nine nodes into two groups: three nodes
with coinciding labels and six nodes with non-coinciding labels. Then the graphs Λ2 are glued up
as described above. Thereafter, three decorating bonds are drawn to connect the external nodes.
This procedure is repeated ad infinitum. Similar constructions for motifsM2 and M3 are presented
in figure 3 and figure 4, respectively. Here we have omitted the decorating bonds not to overload
the pictures. The picture forM4 is obtained from that forM3 by adding the diagonals. The picture
for M5 is just the three-dimensional version of the picture for M1 , where the basic pattern is a
tetrahedron.
2.2. Definitions
In order to fix the terminology and to make the construction of our graphs mathematically
immaculate, we begin by introducing a number of relevant mathematical notions. A (simple) graph
G is a pair of sets (V,E), where V is the set of nodes, whereas E is a subset of the Cartesian product
V × V. We suppose that E is symmetric and irreflexive, i.e., 〈j, i〉 ∈ E whenever 〈i, j〉 ∈ E, and
〈i, i〉 /∈ E for every i, j ∈ V. We say that i and j are connected by a bond if 〈i, j〉 ∈ E. In this case,
we write i ∼ j and say that i and j are adjacent or that they are neighbors. Hence, the elements of
E themselves can be called bonds. The graph is said to be complete if each two nodes are adjacent.
For a given i, by n(i) we denote the degree of i — the number of its neighbors. If V is finite, then E
is also finite, and the graph is said to be finite. Otherwise, the graph is infinite. An infinite graph
is called locally finite, if n(i) is finite for every node. All the infinite graphs we study are countable,
which means that both sets V and E are infinite and countable. Given G = (V,E) and G
′ = (V′,E′),
let φ : V → V
′ be such that φ(i) ∼ φ(j) whenever i ∼ j. Such a map φ is called a morphism. A
bijective morphism is called an isomorphism. If φ is an isomorphism, then its inverse φ−1 is also
an isomorphism, and then the graphs G and G
′ are said to be mutually isomorphic. Such graphs
have identical structures and thus can be identified. In this case, we also say that G′ is a copy of
G. One observes that this refers to both finite and infinite graphs. An isomorphism φ : V → V, i.e.
which maps the graph onto itself, is called an automorphism. The graph G
′ = (V′,E′) such that
V
′ ⊂ V and E
′ ⊂ E is said to be a subgraph of G = (V,E). In this case, we write G
′ ⊂ G. Suppose
that a subgraph G
′ ⊂ G has a copy, say G̃, that is, there exists an isomorphism φ : G̃ → G
′. Then
φ, considered as a map φ : G̃ → G, is called an embedding of G̃ into G, whereas G
′ is called the
image of G̃ under this embedding. Figure 1 presents the so-called unlabeled graphs, which we call
patterns. After labeling, i.e., attaching a label to each of the nodes, such a pattern turns into a
graph. Another labeling may or may not yield the same graph. This depends on whether or not
13801-3
M. Kotorowicz, Yu. Kozitsky
there exists the corresponding automorphism. For instance, any labeling of the triangle M1 yields
the same graph since in any case each of the nodes has the same neighbors. For the pattern M2 ,
the left-hand graph in figure 3 with the interchanged labels a and b is the same. However, the graph
with the interchanges c and d is not the same anymore. Of course, this new graph is isomorphic
to the initial one. This is because there is only one nontrivial automorphism of M2 : the one which
interchanges a and b, and preserves c and d. The triangle has six automorphisms.
Let us now turn to random graphs. To introduce such a graph we need an underlying graph
G = (V,E) and a family E of subsets of E. If G is finite, as E one can take the set of all subsets
of E. In the sequel, we deal with such graphs only. Thus, for E
′ ∈ E , we say that E
′ has been
picked at random with probability P (E′). In the Erdős-Rényi model Gn,p , the underlying graph
is complete with the node set V = {1, . . . , n}. In this model, P (E′) = p|E
′|, where p ∈ [0, 1] and
|E′| stands for the number of elements in E
′. In other words, the elements of E are being picked
independently, each with the same probability p. In a bit complicated model, the bonds are picked
independently but with probability which depends on the bond. In this case, as well as in the case
of the Erdős-Rényi model, we deal with a random graph with independent bonds. For such graphs,
P (E′) =
∏
e∈E′
p(e), (3)
where p(e) is the probability of picking bond e. The set of graphs G′ = (V,E′) with E
′ ∈ E is called
the graph ensemble — each G
′ is picked at random from this ensemble. A random graph model is
the pair consisting of the graph ensemble and of the function P : E → [0, 1]. If the function P is
as in (3), the graph is said to be a random graph with independent bonds. Suppose that we have
two random graph models with independent bonds. Let also G = (V,E) and G̃ = (Ṽ, Ẽ) be their
underlying graphs and φ : V → Ṽ be a morphism. Then this map is said to be the morphism of the
random graphs if for every 〈i, j〉 ∈ E, the probability (in the first model) that this bond is picked
is the same as the corresponding probability (in the second model) for the bond 〈φ(i), φ(j)〉.
2.3. The construction
As was mentioned above, each of our graphs is constructed in an algorithmic way from the cor-
responding motif presented in figure 1. Since they are going to be random graphs with independent
bonds, we have to construct the corresponding underlying graphs and, to define, for a given bond,
the probability of being picked, c.f. (3). In all our models, the bonds will be of two kinds, which
we call basic bonds and decorations. Basic bonds are going to be non-random, i.e. they are picked
with probability one. Decorating bonds appear with probability p ∈ [0, 1], which is a parameter of
the model. Turn now to the construction of the underlying graphs. Let q be the number of nodes
in the corresponding motif, that is, q = 3 for M1 and q = 4 for the remaining motifs. At step
k = 1, we just label the vertices of the corresponding motif by i = 1, . . . , q and obtain the initial
graph Λ1 = (V1 , E1). All its bonds are set to be basic. Suppose now that we have q + 1 copies
of Λ1 obtained by the isomorphisms φj2 , j = 0, 1, . . . , q. Thus, in j-th copy the nodes are φj2(i),
i = 1, . . . , q. The graph Λ2 is obtained from these copies under the following conditions
φ02(i) = φi2(i), i = 1, . . . , q; φi2(j) = φj2(i), i = 1, . . . , q, i 6= j. (4)
Thus, the images of V1 under φi2 and φj2 with i 6= j intersect only at one node where (4) holds. The
maps φj2 , j = 0, 1, . . . , q embed Λ1 into Λ2 . The nodes φi2(i), i = 1, . . . , q, are called the external
nodes of Λ2 . All other nodes are called internal. Thus, Λ2 has q external and q(q − 1)/2 internal
nodes. At this stage, we label them by i = 1, . . . , q(q + 1)/2 in such a way that the external nodes
have the same labels as in Λ1 , that is, φ
i
2(i) = i, i = 1, . . . q. By construction, the bonds obtained
as images under the map φ02 are decorations: they are of the form 〈φ02(i), φ02(j)〉 where i and j
are adjacent in Λ1 . From the first condition in (4) we see that the decorating bonds connect the
external nodes of Λ2 . The remaining bonds of Λ2 are set to be basic. Now we construct Λ3 from
one copy of Λ1 and q copies of Λ2 . Let φ
0
3 be the map which produces the copy of Λ1 and φj3 ,
13801-4
Motif based hierarchical random graph
j = 1, . . . , q be the maps which produce the copies of Λ2 . We then impose the conditions
φ03(i) = φi3(i), i = 1, . . . , q; φi3(j) = φj3(i), i = 1, . . . , q, i 6= j (5)
and obtain Λ3. Thus, φ
0
3 embeds Λ1 → Λ3 , and φ
i
3 : Λ2 → Λ3 , i = 1, 2, . . . , q. As above, the nodes
φi3(i) are set to be external, and the remaining nodes are internal. The images of V2 under φi3 and
φj3 with i 6= j intersect only at one node where (5) holds. Again we label the nodes of Λ3 in such
a way that φi3(i) = i, i = 1, . . . , q. Now let us establish which bonds of Λ2 are decorating and
which are basic. As above, the bonds connecting the external nodes are decorating. The images of
decorating bonds of Λ2 are decorating bonds in Λ3 ; the same is also true for the basic bonds — the
basic bonds of Λ3 are exactly the images of the basic bonds of Λ2 . For k > 4, the construction of
Λk from Λk−1 and Λ1 is identical to the construction of Λ3 just described. As above, by Vk and Ek
we denote the sets of nodes and bonds of Λk , respectively. Thus, for k > 2 we have Ek = E′
k ∪E′′
k ,
where E′
k (respectively, E′′
k ) consists of basic (respectively, decorating) bonds. All Λk , k ∈ N, are
considered as subgraphs of an infinite graph Λ∞ , the structure and properties of which are not
important for the study presented in this article.
Note that the construction principle used above essentially differs from that used in the con-
struction of the hierarchical lattices in [13–16]. Namely, in our case to obtain Λk one replaces each
node of the basic pattern by a copy of the graph Λk−1 . In the hierarchical lattices, one replaces
a bond. As we shall see in the sequel, this leads to essentially different properties of the resulting
graphs. Below in figure 2, we illustrate the construction described above for the case where the
basic pattern is the motif M1 . In this case, the bare graph (i.e. the one which occurs for p = 0)
is the approximating graph for the fractal known as the Sierpiński gasket2. The elements of E′
2
(middle graph) and of E′
3 (right-hand graph) are depicted by solid lines. The elements of E′′
2 and
of E′′
3 are depicted by dotted lines. We omit some dotted lines to indicate that they appear at
random and hence may be absent in a given realization of the graph. Note that Λ3 can be viewed
as the triangle composed of three copies of Λ2 . In figure 3, we present the construction of the
bare graph Λ3 corresponding to M2 . In contrast to the former case, this is not a planar graph.
In figure 4, we construct the bare graph Λ2 for the motif M3 . One observes that in that picture
the node c of the lower left-hand quadrat (i.e. quadrat a) is glued up with node a of the upper
right-hand quadrat. It is interesting that the corresponding fractal can be obtained by the following
procedure, resembling the one which yields the Sierpiński gasket. One takes the full quadrat and
cuts it out into four equal quadrats, but without cutting the external lines. Then, one glues up the
vertices of the smaller quadrats as depicted and proceeds with cutting out the smaller quadrats.
The fractal which one obtains fromM5 is a three dimensional version of the Sierpiński gasket. One
takes the full tetrahedron and cuts out its inner one fourth in such a way that the remaining four
tetrahedra are glued up according to the rule: vertex b of tetrahedron a is glued up with vertex a
of tetrahedron b, etc.
J
JJ
a b
c
-
J
JJ
J
JJ
J
JJ
a b
γ
c
β
α
-
J
JJ
J
JJ
J
JJ
J
JJ
J
JJ
J
JJ
J
JJ
J
JJ
J
JJ
a b
c
Figure 2. Construction of the graph Λ3 based on M1 .
2The fractal itself is obtained as the closure of the set ∪k∈NVk in the appropriate topology, see e.g. [19].
13801-5
M. Kotorowicz, Yu. Kozitsky
������
�
�
�
a b
c
d
-
������
�
�
�
������
�
�
�
�
�
�������
�
�
�
a b
c
d
-
a
������
�
�
�
������
�
�
�
�
�
�������
�
�
�
α b
������
�
�
�
������
�
�
�
�
�
�������
�
�
�
β γ
c
�
�
�
�
�
��
�
�
δ ǫ
ζ
d
������
�
�
�
������
�
�
�
�
�
�������
�
�
�
Figure 3. Construction of the bare graph Λ3 based on M2 .
d c
a b
-
d c
a b
Figure 4. Construction of the bare graph Λ2 based on M3 .
2.4. Degree distribution
Now we turn to the description of the structural properties of the graphs constructed above. Let
mk , k ∈ N, be the number of times the basic pattern appears in non-decorated Λk as a subgraph.
For the graphs based on M1 and M5 we have the same situation. Here m1 = 1 and mk = qmk−1 ,
for k > 2 with the exception in Λ2 , where the additional pattern appears. So, for M1 and M5 we
obtain m1 = 1 and
mk = (q + 1)qk−2, k > 2. (6)
Here q = 3 and q = 4 for M1 and M5 , respectively. For motif M3 we have m1 = 1, m2 = 2q and
mk = qmk−1, k > 3. (7)
Hence mk = 2 · 4k−1 for k > 2. The simplest case if for M4 , where mk = qmk−1 for k > 2. It
gives m4 = 4k−1. The last motif is M2 – triangle with additional bond. On each level this bond
“produces” new 17 patterns. So m1 = 1 and for k > 2 mk = 1
3 (26 · 4k−1 − 17).
Now we analyze the number of times the basic pattern appears in fully decorated Λk , denoted
by m̃k . For the graphs based on M1 and M5 we have
m̃k =
2q + 1
q − 1
qk−1 +
q + 2
q − 1
. (8)
For M3 it is 2
34
k − 5
3 and for M4 we obtain 1
3 (4
k − 1). In all cases, we have mk increasing as
C(p)qk−1, which means that adding decorations does not change the asymptotics of mk .
13801-6
Motif based hierarchical random graph
In a similar way, we obtain
|Vk| =
qk + q
2
, |Ek| = rqk−1 + rp
qk−1 − 1
q − 1
, k ∈ N, (9)
where |Vk| stands for the number of nodes in Λk , whereas |Ek| is the expected number of bonds
in this graph.
As was mentioned above, the degree distribution is a very important characteristic of the graph.
In contrast to Erdős-Rényi type graphs, for our graphs the distribution of the random variable n(i)
depends on the type of i. Thus, the simplest way to describe this distribution is to average n(i)
over the nodes of a given Λk , that is, to consider
nk =
1
|Vk|
∑
i∈Vk
n(i). (10)
Let 〈nk〉 be the expected value of nk . Then
〈nk〉 = 2|Ek|/|Vk| =
4r
q(q − 1)
(q − 1 + p)− 4r
q(q − 1)
· q − 1 + 2p
qk−1 + 1
. (11)
However, this result provides only partial information on the node degree distribution. To get more,
let us analyze the structure of the node sets Vk , k = 1, 2, . . ., more in detail. For a given Λk and
l = 1, . . . , k, let V
(l)
k be the set of nodes i ∈ Vk which are external for some Λl and, at the same
time, are internal for any Λl+1 . Of course, here we mean those Λl’s which are subgraphs for Λk .
As an example, let us consider the graph Λ2 based on M1 , see the middle graph in figure 2. The
nodes a, b, and c constitute V
(2)
2 , whereas the remaining nodes constitute V
(1)
2 .
The elements of V
(k−1)
k are exactly the nodes at which the subgraphs Λj
k−1 , j = 1, . . . , q are
glued up to form Λk , whereas the elements of V
(k)
k are exactly the external nodes of Λk . Then
|V (k)
k | = q and |V (k−1)
k | = q(q − 1)/2. For l < k − 1, we have |V (l)
k | = q|V (l)
k−1|, which can be solved
to yield
|V (l)
k | = 1
2
qk−l(q − 1), l = 1, . . . , k − 1, |V (k)
k | = q. (12)
The reason to consider the sets V
(l)
k is that all the elements of each such V
(l)
k have the same
degree distribution, independent of k for l 6 k− 1. In fact, the degrees of i ∈ V
(1)
k are non-random
since these nodes receive no decorating bonds. For such i, n(i) =
∑
j n
(0)(j), where n(0)(j) is the
degree of the corresponding node in the basic pattern, and the sum is taken over all such patterns
which are glued up. By the symmetry of M1 , M3 , and M5 , we have n(i) = 4 for M1 and M3 , and
n(i) = 6 for M5 . For M2 , n(i) takes values 3, 4, 5, see figure 3. For i ∈ V
(l)
k , l = 2, 3, . . . , k− 1, we
have n(i) = ñ(i) + ν(i), where ñ(i) is non-random and has to be calculated as just described. The
summand ν(i) is the number of decorating bonds attached to i. To simplify our consideration, let
us stick to the case of the graph generated by M1 . Then for l = 1, . . . , k− 1 and i ∈ V
(l)
k , we have
ñ(i) = 4 and ν(i) takes values ν = 0, 1, 2, . . . , 4(l − 1), with probability
Prob (ν(i) = ν) =
(
4(l− 1)
ν
)
pν(1 − p)4(l−1)−ν . (13)
For i ∈ V
(k)
k , ν(i) takes values 0, 1, . . . , 2(k − 1). Therefore, the maximum node degree which can
occur in Vk , k > 2, is
max
i∈Vk
n(i) = 4k − 4. (14)
As is usual in the theory of real world networks, which are in fact non-random, the randomness
manifests itself as the random choice of a node. If we apply this principle here, then (13) can be
considered as the conditional probability distribution, conditioned by the event that the node i
13801-7
M. Kotorowicz, Yu. Kozitsky
has been picked from the set V
(l)
k . The probability of the latter event is taken to be proportional
to the number of its elements, that is,
Prob
(
i ∈ V
(l)
k
)
=
|V (l)
k |
|Vk|
=
q − 1
1 + q1−k
q−l =
2
1 + 31−k
3−l, l 6 k − 1, (15)
Prob
(
i ∈ V
(k)
k
)
=
2q
qk + q
=
2
3k−1 + 1
.
If we now take the expectation of n(i) with respect to this distribution, that is,
〈nk〉 =
k−1∑
l=1
4(l−1)∑
ν=0
(4 + ν)
2 · 3−l
1 + 31−k
·
(
4(l − 1)
ν
)
pν(1− p)4(l−1)−ν (16)
+
2(k−1)∑
ν=0
(2 + ν)
2
3k−1 + 1
·
(
2(k − 1)
ν
)
pν(1 − p)2(k−1)−ν ,
we readily obtain 〈nk〉 = 4+2p−4(1+ p)/(3k−1 + 1), which is in full agreement with the one given
in (11) or in table 1. In order to figure out the limit k → +∞ of the distribution given by (13)
and (15) we calculate its characteristic function, c.f. (16),
ϕk(t) =
k−1∑
l=1
4(l−1)∑
ν=0
exp [it(4 + ν)]
2 · 3−l
1 + 31−k
·
(
4(l − 1)
ν
)
pν(1− p)4(l−1)−ν (17)
+
2(k−1)∑
ν=0
exp [it(2 + ν)]
2
3k−1 + 1
·
(
2(k − 1)
ν
)
pν(1− p)2(l−1)−ν
=
2e4it
1 + 31−k
· 1− 31−k
(
eitp+ 1− p
)4
3− (eitp+ 1− p)
4
+
2e2it
3k−1 + 1
(
eitp+ 1− p
)2
, i =
√
−1 .
Then the limiting characteristic function is
ϕ(t) =
2e4it
3− (eitp+ 1− p)
4 , (18)
which can be continued to a meromorphic function analytic in some complex neighborhood of
the point t = 0. This means that the limiting node degree distribution has all moments and
hence cannot be of scale-free type3. This also agrees with the heuristic rule, see equation (3.13) on
page 188 in [20], that for scale-free networks
max
i∈Vk
n(i) ∼ |Vk|1/(α−1), α > 1, (19)
whereas in our case we have (14) and |Vk| = (3k + 3)/2. In a similar way, one can show that all
our graphs are not scale-free. Another observation on this item can be made by comparing the
function (18) with the characteristic function of the Poisson distribution (2) which has the form
ϕPoisson(t) = exp
[
c
(
eit − 1
)]
,
and hence can be continued to a function analytic on the whole complex plane. Therefore, the
distribution corresponding to (18) with p > 0 is intermediate as compared to the Poisson and
scale-free distributions. For p = 0, the function (18) is also entire.
3For scale-free graphs, the node degree distribution is P (k) = Ck−γ , k > 1, γ > 1; hence,
∑∞
k=1
kmP (k) diverges
for all m > γ − 1.
13801-8
Motif based hierarchical random graph
2.5. Amenability, clustering, and small world properties
The next property of our graphs which we are going to address is amenability. To introduce it
we need one more notion. Let G = (V,E) be a countable graph with node set V and bond set E.
For a finite ∆ ⊂ V , by ∂∆ we denote the set of nodes which are not in ∆ but have neighbors in ∆.
This set is the outer boundary of ∆, whereas the elements of ∆ which are neighbors to the elements
of ∂∆ constitute the inner boundary of ∆. As usual, by |∆| and |∂∆| we denote the number of
nodes in these sets. The graph G is said to be amenable if there exists a sequence of finite node
sets {∆k}k∈N , such that
lim
k→+∞
|∂∆k|
|∆k|
= 0. (20)
If such a limit is positive for any sequence {∆k}k∈N , the graph is called nonamenabile. The lattices
Z
d, d > 1, are amenable graphs and for such sets one can take the cubes
∆k = {i = (i1, . . . id) ∈ Z
d : |ij | 6 Nk , j = 1, . . . , d},
such that Nk+1 > Nk and Nk → +∞. In this case, |∆k| ∼ Nd
k and |∂∆k| ∼ Nd−1
k and hence (20)
holds. Sometimes, sequences for which (20) holds are called Van Howe sequences, see e.g. [21].
Cayley trees, except for Z, are nonamenable. Let us turn now to our graphs. Due to their hier-
archical structure, it is convenient to check (20) for the sequence of node sets of Λk , that is for
{Vk}k∈N . By the construction of Λk , the inner boundary of each Vk is exactly the set of all its
external nodes, the number of which is equal to the number of nodes in the corresponding motif,
i.e. it is q. By construction, one of them becomes an external node of Λk+1 , and the remaining
q− 1 ones become inner nodes of Λk+1 . For all the motifs Mj , j = 1, . . . , 5, we have the degree of
any node therein being at most 3, see figure 1. Then for all our graphs,
max
i∈Vk
n(i) 6 6k,
c.f. (14). At the same time, |Vk| ∼ qk, q = 3, 4, see (9), which immediately yields that all our
graphs are amenable.
Now we study the clustering in our graphs. For non-random graphs, the clustering coefficient is
defined as follows. For a given node i ∈ V of degree n(i), let N(i) be the number of bonds linking its
neighbors, which is the number of triangles with vertex i. Clearly, N(i) 6 n(i)[n(i)− 1]/2 and the
maximum value of this parameter is attained for complete graphs where each node is a neighbor
to any other one. Thus, the quantity
Q(i) :=
2N(i)
n(i)[n(i)− 1]
, (21)
characterizes clustering at node i. Then we define the clustering of our graphs as
Q = lim
k→+∞
1
|Vk|
∑
i∈Vk
Q(i). (22)
Note that for many graphs, e.g., for trees or bipartite graphs, one has Q(i) = 0 for any node i,
see also [22, 23]. For random graphs, the degree n(i), as well as the parameter N(i), are random.
Since in this case the calculation of Q is much more involved, we postpone it to the future. Here
we only compare the values of Q obtained for the bare graphs with those for fully decorated ones.
For the graph based onM1 and a node i ∈ V
(l)
k , l = 1, . . . , k−1, we have: (a) n(i) = 4, N(i) = 3
for l = 1, and N(i) = 2 for l > 2; (b) n(i) = 4l, N(i) = 4l. Here (a) and (b) correspond to a
bare graph and to a fully decorated graph, respectively. These numbers follow directly from the
construction of the graphs. The number of elements in each V
(l)
k is given in (12), which allows one
to compute
(a) Q = lim
k→+∞
(
1
3
+
|V (1)
k |
6|Vk|
+
2
|Vk|
)
=
4
9
= 0.4444 . . . , (23)
13801-9
M. Kotorowicz, Yu. Kozitsky
(b) Q = 2 · 3−1/4 arctan 3−1/4 − 1
31/4
ln
31/4 + 1
31/4 − 1
≈ 0.525897. (24)
For the bare graph based on M3 , we have N(i) = 0 for all nodes; hence, Q = 0 in this case. For
the fully decorated graph based on M3 , we observe that two nodes of V
(1)
2 have neighbors only in
V
(1)
2 , and the remaining four nodes have two neighbors in V
(1)
2 and two — in V
(2)
2 . Since for the
nodes i ∈ V
(1)
2 , we have N(i) = 0, like in the case of the bare graph, we should consider these two
groups separately. Thus, we split each V
(l)
k , l = 1, . . . , k− 1, into V
(l)
k,0 and V
(l)
k,1 , where the first set
consists of the nodes which have neighbors only in V
(l)
k,0 . The elements of V
(l)
k,1 have also neighbors
in V
(l′)
k with l′ > l. The number of nodes in these sets are:
|V (l)
k,0 | =
1
2
4k−l, |V (l)
k,1 | = 4k−l.
For all i ∈ V
(l)
k , l = 1, . . . , k− 1, we have n(i) = 4l. At the same time, N(i) = 4(l− 1) for i ∈ V
(l)
k,0 ,
and N(i) = 1 + 4(l− 1) for i ∈ V
(l)
k,1 . Putting all these numbers together we obtain
Q =
3
2
∞∑
l=2
(l − 1)4−(l−1)
l(4l− 1)
+
∞∑
l=1
4−l
l(4l− 1)
≈ 0.1223. (25)
For the bare graph based on M5 one can obtain for i ∈ V
(l)
k , l = 1, 2, . . . , k − 1: n(i) = 6, N(i) = 8
for l = 1, and n(i) = 6, N(i) = 6 for l > 2. For the fully decorated graph based on M5 we have for
all internal nodes n(i) = 6l, and N(i) = 9 for l = 1, and N(i) = 12l+7 for l > 2. Hence, we obtain
(a) Q = lim
k→+∞
(
2
5
+
2|V (1)
k |
15|Vk|
+
12
5|Vk|
)
= 0.5, (26)
(b) Q ≈ 0.554145.
There exists one more property of real world networks, which Erdős-Rényi type graph does not
share, see e.g. [20, 24]. It is the so-called small-world property, illustrated by Pal Erdős himself
in the following way. All authors of mathematical papers are given the Erdős index which for his
coauthors is equal to one. For their coauthors who are not Erdős’ coauthors, this index is equal
to 2, and so on. Everyone whose papers are indexed by the Mathematical Reviews can check his
own index at the web-site http://www.ams.org/mathscinet/. It turns out that for many authors it
ranges from 2 to 6 (for the second named author of this paper it is 4). To formulate the small-world
property one needs the following notion. A path in the graph is a sequence of nodes such that every
two consecutive elements of this sequence are neighbors to each other. The length of the path is
the number of such consecutive pairs, which is equal to the number of bonds one passes on the
way from the origin to the terminus. If every two nodes can be connected by a path, the graph
is said to be connected. For the given two nodes, i and j, the length of the shortest path which
connects them is said to be the distance ρ(i, j) between these nodes. Informally speaking, a graph
G = (V,E) has the small-world property (or is a small-world graph) if every two nodes i, j ∈ V are
“not too far” from each other. More precisely this property is formulated as follows. An infinite
graph G has a small-world property if there exists a sequence of its connected finite subgraphs
{Gk}k∈N with the following property. Let diam(Gk) = maxi,j∈Vk
ρ(i, j) be the diameter of Gk ,
k ∈ N, and 〈nk〉 be the average value of the node degree in Gk , that is, 〈nk〉 = 2|Ek|/|Vk|. Then
the sequence {Gk}k∈N , and hence the graph G, are said to have the small-world property if there
exists a positive constant C such that for all k ∈ N,
diam(Gk) 6 C log〈nk〉 |Vk|. (27)
This means that in such graphs, the distances between the nodes scale at most logarithmically
with the size of the graph. For our graphs, the results on this item are given in the last three rows
13801-10
http://www.ams.org/mathscinet/
Motif based hierarchical random graph
of table 1. The diameters of Λk presented therein were calculated in a routine way for the cases
where the graphs are bare (p = 0) or are fully decorated (p = 1). In the former case, neither of our
graphs has the small-world property. However, this property holds for all fully decorated graphs.
Table 1. The structural characteristics of the families of hierarchical graphs.
motif M1 M2 M3 M4 M5
|Vk| 3
2 (3
k−1 + 1) 2(4k−1 + 1) 2(4k−1 + 1) 2(4k−1 + 1) 2(4k−1 + 1)
|Ek| 3k 4k 4k 5 · 4k−1 6 · 4k−1
3
2 (3
k−1 − 1)p 4
3 (4
k−1 − 1)p 4
3 (4
k−1 − 1)p 5
3 (4
k−1 − 1)p 2(4k−1 − 1)p
〈nk〉 4 + 2p 4 + 4
3p 4 + 4
3p 5 + 5
3p 6 + 2p
−4 1+p
3k−1+1
− 4
3
3+2p
4k−1+1
− 4
3
3+2p
4k−1+1
− 5
3
3+2p
4k−1+1
−2 3+2p
4k−1+1
diam(Λk), p = 0 2k−1 2k 2k 2k 2k−1
diam(Λk), p = 1 k k + 1 2(k − 1) k k
C, p = 1 (log6 3)
−1 (log6 4)
−1 2(log6 4)
−1 (log7 4)
−1 (log8 4)
−1
In table 1, we collected the structural characteristics of our graphs based on the motifsM1 , . . . ,
M5 given in figure 1. Its first three rows are obtained from the formulas (9) and (11).
3. Graph structure and the Ising model properties
As was mentioned above, there exists a profound connection between the properties of Gibbs
random fields of models based on graphs and the structural properties of these graphs4. For the
hierarchical lattices, the notion of the Gibbs random field of the Ising model was introduced
in [14, 15]. In the physical terminology, each (pure) Gibbs random field corresponds to a state of
thermal equilibrium of the model, see [25] for more details. Accordingly, the existence of multiple
Gibbs random fields corresponds to the existence of multiple equilibrium states and hence of phase
transitions. If there is no interaction between the spins, the Gibbs random field is unique. However,
if the interaction is strong enough and if it is effectively propagated by the underlying graph (high
enough “connectivity”), the Gibbs fields can be multiple. The condition of high connectivity is
essential, which can be seen from the fact that the Ising model on the one-dimensional lattice Z,
considered as a graph with the natural adjacency relation, bears only one Gibbs field and hence
no phase transitions can occur in this case – no matter how strong the interaction is. With regard
to these arguments, we can divide all graphs into three groups according to the following property
of the Ising model defined on these graphs:
(a) There exists only one Gibbs random field for all interactions.
(b) There exists only one Gibbs random field for weak interactions, and multiple Gibbs
random fields for strong interactions.
(c) There exist multiple Gibbs random fields for all nonzero interactions.
4Of course, we are speaking now about countably infinite graphs.
13801-11
M. Kotorowicz, Yu. Kozitsky
As was mentioned above, the lattice Z belongs to the first group. The lattices Z
d with d > 2, as
well as all Cayley trees5 belong to the second group. An example of the graph belonging to the
third group can be found in section 4 of [26]. Clearly, the above classification should be made more
precise for random graphs, since in this case the existence of a Gibbs random field is a random
event. We return to this issue below.
The Ising model defined on the graphs from the second group may have a critical point, which
separates the regime of uniqueness (weak interactions) from the regime of non-uniqueness (strong
interactions). At their critical point, the Gibbs random fields have “unusual” properties, which
can be detected without explicit construction of these fields. One of such properties is the so-
called self-similarity, which manifests itself in the appearance of unstable fixed points of some
(renormalization) transformations. It turns out that the hierarchical graphs are quite suitable for
such a study — that it why they appear in this context. Thus, one can have the following criterion:
if the Ising model has a critical point, the graph belongs to the second group. If not, then the
graph belongs either to the first or to the third group. The latter cases can be distinguished by an
additional study.
In contrast to the hierarchical lattices introduced and studied in [16], our bare graphs belong
to the first group. This can be seen from the analysis which we present below — a direct proof
of such a statement will be done in our forthcoming publication. Thus, the interaction along the
decorating bonds plays the main role in the possible appearance of phase transitions in the Ising
model defined on our graphs. In view of this fact, we will assume that the solid bonds bear the
interaction K, whereas the dotted bonds bear the interaction L. As the bonds of the latter kind
appear at random, we can think of the corresponding model as of the one defined on the fully
decorated graph with random interactions along the decorating bonds. Thus, in this model, the
interaction along each bond 〈i, j〉 is a random variable, denoted by Lω
ij , which takes values 0 and
some nonzero L ∈ R with probabilities 1−p and p, respectively. For different bonds, these random
variables are independent.
For a given k ∈ N, the Ising model on the fully decorated graph Λk is defined in the usual way
by assigning spin variables σi = ±1 to the nodes i ∈ Vk and by setting the Hamiltonian
− βHk = h
∑
i∈Vk
σi +K
∑
〈i,j〉∈E′
k
σiσj +
∑
〈i,j〉∈E′′
k
Lω
ijσiσj , h,K ∈ R, k ∈ N, (28)
where h is an external field. In accordance with the above arguments, the third summand cor-
responds to the interaction along decorating bonds. We have included the first term in view of
the following arguments. As is known, the Ising model on the lattices Z
d, d > 2, exhibits phase
transitions only if h = 0. This is also the case if the graph is amenable and quasi-transitive. For
nonamenable graphs, this model may have a phase transition for nonzero h, see [27].
By the construction of our graphs, each Λk has q external nodes, i1, . . . , iq , and the correspond-
ing number of internal nodes, see table 1. Such external nodes can be considered as a boundary of
Λk . Correspondingly, we call the spin variables external or boundary (respectively, internal) spins if
they are assigned to external (respectively, internal) nodes. For a fixed configuration of the external
spins σi1 , . . . , σiq , we consider
Zω
k (σi1 , . . . , σiq ) =
∑
internal spins of Λk
exp (−βHk) . (29)
This is the conditional partition function of the spin system in Λk , conditioned by the fixed
configuration of spins on the boundary of Λk . Of course, it depends on the graph, i.e. on the motif
used in its construction. According to the main principle of the theory of Gibbs random fields
applied in our context, see [25], the fact that such a field is unique is ensured by the conditional
partition function asymptotic independence, as k → +∞, of the boundary spins. For our graphs,
Zω
k are random and hence also depend on ω. In this situation, one can apply the following two
approaches: the above mentioned independence holds (i) for almost all ω; (ii) in average. The latter
5Except for Z, see page 247 in [25].
13801-12
Motif based hierarchical random graph
corresponds to the fact that the expected values of Zω
k , which we denote by 〈Zω
k 〉, are independent of
the boundary spins. These two approaches are called quenched and annealed disorders, respectively,
see [28], page 99. We will work in the annealed approach. It can be shown that the summands in (29)
are positive and separated from zero. Since the number of these summands increases to +∞ as
k → +∞, we have 〈Zω
k 〉 → +∞. Therefore, a weaker form of the uniqueness condition can be
lim
k→+∞
〈Zω
k (σi1 , . . . , σiq )〉/〈Zω
k (σ
′
i1 , . . . , σ
′
iq )〉 = c, (30)
which holds for any two configurations of the boundary spins and for some c > 0, which depends
on these configurations. The convergence in (30) should be stable with respect to small changes of
h and K, i.e. of the starting element Z1 . In this case, the annealed limiting free energy per spin is
independent of the boundary configuration. Correspondingly, a necessary condition for the latter
quantity to be dependent on the boundary spins is that
lim
k→+∞
〈Zω
k (σi1 , . . . , σiq )〉/〈Zω
k (σ
′
i1 , . . . , σ
′
iq )〉 = +∞, (31)
for some σi1 , . . . , σiq and σ′
i1 , . . . , σ
′
iq . We say that the Ising model defined on our graph has a
critical point, if there exists c′ > 0, distinct from c in (30), such that for K = K∗ and h = h∗ ,
lim
k→+∞
〈Zω
k (σi1 , . . . , σiq )〉/〈Zω
k (σ
′
i1 , . . . , σ
′
iq )〉 = c′. (32)
Here K∗ and h∗ are certain values of the interaction intensity and the external field. The conver-
gence in (32) should be such that for arbitrarily small deviations from the point (K∗ , h∗) one has
either (30) or (31) instead of (32). Note that we do not exclude that h∗ 6= 0 since our graphs are
not quasi-transitive and hence the result of [27] may not be applicable in this case.
4. Critical points of the Ising model on M1 based graph
For k = 1, we have only basic bonds and no inner nodes. Thus,
Z1(a, b, c) = exp [−βH1(a, b, c)] = exp[K(ab+ ac+ bc) + h(a+ b+ c)], (33)
where we use the same notations for the nodes a, b, c, see the left-hand graph in figure 2, as well
as for the corresponding spin variable, that is, for short we write a = σa , b = σb , ect. For k = 2,
we have, see the middle graph in figure 2,
−βH2(a, b, c, α, β, γ) = −βH1(a, γ, β)− βH1(γ, b, α)− βH1(β, α, c) + Lω
abab+ Lω
bcbc+ Lω
acac.
Thus, to obtain Z2(a, b, c) we have to sum out the internal spins, see (29). That is,
Zω
2 (a, b, c) = exp [Lω
abab+ Lω
acac+ Lω
bcbc]
∑
α,β,γ
Z1(a, γ, β)Z1(γ, b, α)Z1(β, α, c),
where the sum is taken over α, β, γ = ±1. According to the hierarchical structure of the underlying
graph, for all k > 2 the graph Λk is obtained from the subgraphs Λk−1 exactly in the same way.
This yields the following recurrence for the partition functions (29)
Zω
k (a, b, c) = Rω
k (a, b, c)
∑
α,β,γ
Zk−1(a, γ, β)Zk−1(γ, b, α)Zk−1(β, α, c), (34)
where
Rω
k (a, b, c) = exp [Lω
abab+ Lω
acac+ Lω
bcbc] , (35)
and Z1(a, b, c) is given in (33). From the independence of Lω
ij for different bonds, it follows that the
random variables Zω
k−1 on the right-hand side of (34) are independent, which allows us to compute
the expectations and obtain
〈Zω
k (a, b, c)〉 = 〈Rω
k (a, b, c)〉
∑
α,β,γ
〈Zω
k−1(a, β, γ)〉〈Zω
k−1(α, b, γ)〉〈Zω
k−1(α, β, c)〉. (36)
13801-13
M. Kotorowicz, Yu. Kozitsky
We recall that the random variables Lω
ij take the values L 6= 0 and 0 with probabilities p and
1− p, respectively. In view of the model symmetry, c.f. (33), the system (36) involves the following
variables
Ak = 〈Zω
k (1, 1, 1)〉, Bk = 〈Zω
k (1, 1,−1)〉, (37)
Ck = 〈Zω
k (−1,−1, 1)〉, Dk = 〈Zω
k (−1,−1,−1)〉,
which have the initial values
A1 = e3(K+h), B1 = e−K+h, C1 = e−K−h, D1 = e3(K−h). (38)
By direct calculations,
〈Rω
k (1, 1, 1)〉 = (p exp(L) + 1− p)3, (39)
〈Rω
k (−1, 1, 1)〉 = (p exp(L) + 1− p)(p exp(−L) + 1− p)2.
Thereafter, the recursion (36) can be written in the form
xk+1 = t
Px(xk, yk)
Q(xk, yk, zk)
, (40)
yk+1 =
Py(xk, yk, zk)
Q(xk, yk, zk)
,
zk+1 = t
Pz(yk, zk)
Q(xk, yk, zk)
,
with the initial conditions
x1 = e4(K+h), y1 = e2h, z1 = e4K−2h, (41)
where we have used the notations
xk = Ak/Ck , yk = Bk/Ck , zk = Dk/Ck , k ∈ N, (42)
and
t =
(
p eL + 1− p
p e−L + 1− p
)2
. (43)
The polynomials in (40) have the following form
Px(x, y) = x3 + 3xy2 + 3y2 + 1, (44)
Py(x, y, z) = x2y + y3 + 2xy + y2z + 2y + z,
Pz(y, z) = y3 + 3y + 3z + z3,
Q(x, y, z) = xy2 + x+ 2y2 + 2yz + z2 + 1.
For every t > 0, the mapping (xk , yk , zk) 7→ (xk+1 , yk+1 , zk+1) = Tt(xk , yk , zk) , defined in (40)
and (44), maps the first octant of R3 into itself. The starting point (x1 , y1 , z1) lies on the surface
S defined by the equation, c.f. (41),
x = y3z, (45)
which, however, is not preserved by this mapping, which can be checked directly. Let Tt be the
invariant set of the map Tt , that is, the set of points (x, y, z) such that Tt(x, y, z) = (x, y, z).
Suppose that the intersection of Tt with S is non-void. If (x∗ , y∗ , z∗) belongs to this intersection
13801-14
Motif based hierarchical random graph
-
6
�
�
�
�
�
�
�
�
�
�
�
4
3 t x
(1)
∗
x
(2)
∗
φt(x)
Figure 5. Graphical solution of (48).
and (x1 , y1 , z1) = (x∗ , y∗ , z∗) , then (xk , yk , zk) = (x∗ , y∗ , z∗) for all k ∈ N. Let us find such
points. From the second equation in (40) for x = y3z we get
yQ(y3z, y, z) = Py(y
3z, y, z),
which can be transformed into the following
y3(1 + y3z)(1− yz) = (y + z)(1− yz). (46)
A solution of the latter equation is z = 1/y, thus x = y2, which being used in the first equation
in (40) yields (1 + y2)2 = t(1 + y2)2 and hence t = 1. For p > 0, the latter implies L = 0, and also
K = 0, see (41). This fixed point corresponds to a noninteracting system of spins in an external
field and thereby has nothing to do with critical points. For z 6= 1/y, from (46) we get
z(1− y2)(y4 + y2 + 1) = −y(1− y2), (47)
which for positive y and z has a unique solution y = 1, and hence x = z. We insert this into the
first equation in (40) and obtain
x = t
x3 + 3x+ 4
x2 + 4x+ 3
= t
x2 − x+ 4
x+ 3
:= φt(x). (48)
For t = 1, the only solution is x = 1, which corresponds to L = K = 0. The choice t = 1 also
corresponds to a bare graph (p = 0); hence, the bare graph based on M1 has no critical points
and no phase transitions. As we have already mentioned above, in a separate work we prove that
the Gibbs states of the Ising model based on this graph are always unique. For t < 1, that is, for
L < 0, (48) has only one positive solution
x∗ =
−3− t+
√
9 + 22t− 15t2
2(1− t)
< 1, (49)
which corresponds to K∗ < 0. It is stable and (xk , yk , zk) → (x∗, 1, x∗) as k → +∞, for any
(x1 , y1 , z1) ∈ S. Thus, for L < 0, the Ising model has no critical points and no phase transitions,
even for the fully decorated graph. This can be caused by a frustration, which takes place in an
antiferromagnetic Ising model on triangles. For t > 1, figure 5 presents the graphical solutions
of (48). They have the following form
x
(1)
∗ =
3 + t−
√
9 + 22t− 15t2
2(t− 1)
, x
(2)
∗ =
3 + t+
√
9 + 22t− 15t2
2(t− 1)
. (50)
By direct calculations, we get φ′t(x
(1)
∗ ) < 1 and φ′t(x
(2)
∗ ) > 1, see figure 5. Hence, x
(1)
∗ is stable,
whereas x
(2)
∗ is unstable. Note also that x
(1)
∗ → 1 and x
(2)
∗ → ∞ as t→ 1. The solutions (50) exist
and are considered to be distinct, provided t ∈ (1, 9/5). This yields the condition
p < ψ(L) :=
3−
√
5√
5 exp(L)− 3 exp(−L) + 3−
√
5
. (51)
13801-15
M. Kotorowicz, Yu. Kozitsky
Since ψ(L) is a decreasing function, the equation ψ(L) = 1 has only one solution
L∗ =
1
4
ln
9
5
. (52)
Then, for L 6 L∗ , the critical point exists for all p ∈ (0, 1]. For such L and p, let K∗(L, p) be the
solution of the equation
exp(4K) = x
(2)
∗ . (53)
Then
lim
k→+∞
xk =
x
(1)
∗ if x1 < exp[4K∗(L, p)],
x
(2)
∗ if x1 = exp[4K∗(L, p)],
+∞ if x1 > exp[4K∗(L, p)].
(54)
The conditions in (54) can be formulated directly for K, e.g. xk → x
(1)
∗ if K < K∗(L, p). Thus,
x
(1)
∗ is the so-called high-temperature fixed point. For L > L∗ , we have ψ(L) < 1. Hence, the
condition (51) is not satisfied for p ∈ (ψ(L), 1], which also includes the fully decorated graph with
p = 1. For such L and p, the whole graph of φt lies above the line φt(x) = x, which means that
xk → +∞ for all initial x1 > 0. Thus, for L > L∗ and p ∈ (ψ(L∗), 1], the model has no critical
points and the Gibbs random fields are multiple for all K ∈ R. For p = ψ(L∗), we have t = 9/5
and x
(1)
∗ = x
(2)
∗ = 3, which corresponds to K∗ = (ln 3)/4. In this case, xk → 3 if K 6 K∗ , and
xk → +∞ if K > K∗ .
5. Concluding remarks
5.1. Construction and structural properties
The graphs introduced in this paper are constructed from motifs M1 , . . . ,M5 in an algorithmic
way, like the hierarchical lattices introduced in [13], and employed in [16] where they were supplied
with long-range (decorating) bonds. However, our main construction principle — to replace nodes
with the graphs of the previous level — differs from the one used in those papers, where the graphs
of the previous level replaced the bonds. Hierarchical graphs of this kind model the real world
networks with the so-called modular structure, which are organized in tightly knit communities
with relatively sparse connections between them. For more details herein, we refer the reader
to [29, 30] and to the publications cited therein. In contrast to the graphs introduced in [16], see
also [29], our decorated graphs are not scale-free. For them, the node degree distribution is of
intermediate type such that all the moments exist. The corresponding characteristic function can
be extended to a meromorphic function, analytic in the complex neighborhood of zero, see (18),
whereas for scale-free graphs such functions are nonanalytic at zero. All our graphs are amenable,
which correlates with the property just discussed, see (14), (9), and (19). An interesting property
is that, like for the graphs studied in [16], adding decorations forms the graphs possessing the
small-world property.
5.2. Critical points
The appearance of critical points, and hence of phase transitions, for the Ising model confirms
good communicating properties of the underlying graphs. For our graphs, in contrast to the hierar-
chical lattices for which phase transitions take place even without decorations, critical points can
exist only if the decorations are applied, with any p > 0. The most interesting related fact is that
for the graph based on M1 , the antiferromagnetic Ising model has no phase transitions for any L
and p. This is due to the generic frustration of such models — the elementary factor Rk(a, b, c)
which appears in (35) with negative L cannot be maximized. We expect that the same is true for
the graphs based on M5. To check if this conjecture of ours is true we plan to study a Potts model
on the same graph and q > 3, for which such a frustration is no longer actual. We also plan to
13801-16
Motif based hierarchical random graph
look for critical points with nonzero h, as well as for critical points of the Ising model with the
underlying graphs based on the remaining motifs. However, the corresponding problems are much
tougher, so that the appropriate numerical means should be applied.
6. Acknowledgement
The authors benefited from fruitful discussions on the matter of this work held with our col-
leagues Yuri Kondratiev and Vasyl Ustimenko for which they are cordially grateful. The authors
are also grateful to the unnamed referee whose remarks and suggestions were helpful in improving
the presentation of the article.
References
1. Erdős P., Rényi A., Publicationes Mathematicae, 1959, 6, 290.
2. Erdős P., Rényi A., Publications of the Mathematical Institute of the Hungarian Academy of Sciences,
1960,5, 17.
3. Bia las, P., Burda, Z., Wac law, B. Causal and homogeneous networks. In: Science of complex networks,
14,AIP Conf. Proc., 776, Amer. Inst. Phys., Melville, NY, 2005.
4. Watts D.J., Strogatz H., Nature, 1998, 393, 440; doi:10.1038/30918.
5. Barabási A.-L., Albert R., Science, 1999, 286, 509; doi:10.1126/science.286.5439.509.
6. Milo R. et al., Science, 2002, 298, 824; doi:10.1126/science.298.5594.824.
7. Itzkovitz S. et al., Phys. Rev. E, 2003, 68, 026127; doi:10.1103/PhysRevE.68.026127.
8. Alon U., Science, 2003, 301, 1866; doi:10.1126/science.1089072; Nature Reviews Genetics, 2007, 8,
450; doi:10.1038/nrg2102.
9. Kashtan N., Itzkovitz S., Milo R., Alon U., Phys. Rev. E, 2004, 70, 031909;
doi:10.1103/PhysRevE.70.031909.
10. Itzkovitz S., Alon U., Phys. Rev. E, 2005, 71, 026117; doi:10.1103/PhysRevE.71.026117.
11. Matias C. et al, REVSTAT, 2006, 4, 31.
12. Häggström O., Adv. Appl. Probab., 2000, 32, 39.
13. Griffiths R.B., Kaufman M., Phys. Rev. B, 1982, 26, 5022; doi:10.1103/PhysRevB.26.5022.
14. Bleher P.M., Žalys E., Litovsk. Mat. Sb., 1988, 28, 252 [English translation in Lithuanian Math. J.,
1989, 28, 127; doi:10.1007/BF01027189].
15. Bleher P.M., Žalys E., Commun. Math. Phys., 1989, 120, 409; doi:10.1007/BF01225505.
16. Hinczewski M., A. Nihat Berker, Phys. Rev. E, 2006, 73, 066126; doi:10.1103/PhysRevE.73.066126.
17. Wróbel M., Condens. Matter Phys., 2008, 11, 341.
18. Kotorowicz M., Albanian Journal of Mathemathics, 2008, 3, 235.
19. Barlow M.T. Heat kernels and sets with fractal structure. In: Heat kernels and analysis on manifolds,
graphs, and metric spaces (Paris, 2002). Contemp. Math., 338, Amer. Math. Soc., Providence, RI,
2003.
20. Newman M.E.J., SIAM Review, 2003, 45, 167; doi:10.1137/S003614450342480.
21. Ruelle D., Statistical mechanics: Rigorous results. W.A. Benjamin, Inc., New York–Amsterdam, 1969.
22. Erdős P., Kleitman D.J., Rothschild B.L., Asymptotic enumeration of Kn-free graphs. In: Colloquio
Internazionale sulle Teorie Combinatorie (Rome, 1973), Tomo II, pp. 19. Atti dei Convegni Lincei, No.
17, Accad. Naz. Lincei, Rome, 1976.
23. Futorny V., Ustimenko V., Acta Appl. Math., 2007, 98, 47; doi:10.1007/s10440-007-9144-8.
24. Barrat A., Weigh M., Eur. Phys. J. B, 2000, 13, 547; doi:10.1007/s100510050067.
25. Georgii H.-O., Gibbs measures and phase transitions. de Gruyter Studies in Mathematics, 9. Walter
de Gruyter & Co., Berlin, 1988.
26. Kȩpa D., Kozitsky Y., Condens. Matter Phys., 2008, 11, 313.
27. Jonasson J, Steif J.E., J. Theoret. Probab., 1999, 12, 549; doi:10.1023/A:1021690414168.
28. Bovier, A., Statistical mechanics of disordered systems. A mathematical perspective. Cambridge Se-
ries in Statistical and Probabilistic Mathematics, Cambridge University Press, Cambridge, 2006;
doi:10.1017/CBO9780511616808.004.
29. Hinczewski M., Phys. Rev. E, 2007, 75, 06611104; doi:10.1103/PhysRevE.75.061104.
30. Kashtan N., Mayo A.E., Kalisky T., Alon U., PLoS Comput. Biol., 2009, 5, e1000355;
doi:10.1371/journal.pcbi.1000355.
13801-17
http://dx.doi.org/10.1038/30918
http://dx.doi.org/10.1126/science.286.5439.509
http://dx.doi.org/10.1126/science.298.5594.824
http://dx.doi.org/10.1103/PhysRevE.68.026127
http://dx.doi.org/10.1126/science.1089072
http://dx.doi.org/10.1038/nrg2102
http://dx.doi.org/10.1103/PhysRevE.70.031909
http://dx.doi.org/10.1103/PhysRevE.71.026117
http://dx.doi.org/10.1103/PhysRevB.26.5022
http://dx.doi.org/10.1007/BF01027189
http://dx.doi.org/10.1007/BF01225505
http://dx.doi.org/10.1103/PhysRevE.73.066126
http://dx.doi.org/10.1137/S003614450342480
http://dx.doi.org/10.1007/s10440-007-9144-8
http://dx.doi.org/10.1007/s100510050067
http://dx.doi.org/10.1023/A:1021690414168
http://dx.doi.org/10.1017/CBO9780511616808.004
http://dx.doi.org/10.1103/PhysRevE.75.061104
http://dx.doi.org/10.1371/journal.pcbi.1000355
M. Kotorowicz, Yu. Kozitsky
Iєрархiчнi випадковi графи з мотивiв: структурнi властивостi
та критичнi точки моделi Iзiнга
Монiка Которович, Юрiй Козицький
Iнститут математики, Унiверситет Марiї Кюрi-Склодовської, Люблiн
Вводиться i вивчається клас випадкових графiв, збудованих в алгоритмiчний спосiб з п’яти мотивiв,
знайдених у [Milo R., Shen-Orr S., Itzkovitz S., Kashtan N., Chklovskii D., Alon U., Science, 2002, 298, 824].
Конструкцiйна схема нагадує схему, застосовану у [Hinczewski M., A. Nihat Berker, Phys. Rev. E, 2006,73, 066126], згiдно з якою короткосяжнi ребра є невипадковi, тодi як довгосяжнi ребра виникають
незалежно i з однаковою ймовiрнiстю. Описано ряд структурних властивостей графiв, серед яких
є розподiл ступенiв, кластернiсть, аменабiльнiсть, властивiсть тiсного свiту. Для одного з мотивiв
вивчається критична точка моделi Iзiнга, визначеної на вiдповiдному графi.
Ключовi слова: аменабiльнiсть, розподiл ступенiв, кластернiсть, граф тiсного свiту, модель Iзiнга,
критична точка
13801-18
Introduction and setup
The graphs: construction and structural properties
The construction: informal description
Definitions
The construction
Degree distribution
Amenability, clustering, and small world properties
Graph structure and the Ising model properties
Critical points of the Ising model on M1 based graph
Concluding remarks
Construction and structural properties
Critical points
Acknowledgement
|