Skip to main content

ORIGINAL RESEARCH article

Front. Phys., 09 December 2022
Sec. Social Physics
This article is part of the Research Topic Hidden Order Behind Cooperation in Social Systems View all 13 articles

Hitting time for random walks on the Sierpinski network and the half Sierpinski network

  • School of Mathematical Sciences, Jiangsu University, Zhenjiang, China

We consider the unbiased random walk on the Sierpinski network (SnN) and the half Sierpinski network (HSnN), where n is the generation. Different from the existing works on the Sierpinski gasket, SnN is generated by the nested method and HSnN is half of SnN based on the vertical cutting of the symmetry axis. We study the hitting time on SnN and HSnN. According to the complete symmetry and structural properties of SnN, we derive the exact expressions of the hitting time on the nth generation of SnN and HSnN. The curves of the hitting time for the two networks are almost consistent when n is large enough. The result indicates that the diffusion efficiency of HSnN has not changed greatly compared with SnN at a large scale.

1 Introduction

In recent decades, complex networks have attracted great interest in the scientific community [1,2] and are considered valuable tools for describing real-world systems in the nature and society [3]. They also have a significant impact on mobility patterns, network sampling, community detection, signal transmission, virus spreading, epidemic control, and link prediction [4,5]. In recent years, complex networks have not only been studied in the field of mathematics due to their intersectionality and complexity but also more scholars in other disciplines have begun to pay attention to them, which involves system science, statistical physics, computer and information science, etc. [69] Common analysis methods and tools include the graph theory, combinatorial mathematics, matrix theory, probability theory, and stochastic process.

A fractal is a rough or fragmented geometric shape that can be divided into multiple parts, and each part is approximately a reduced-version copy of the whole. According to this definition, a fractal feature is a property known as self-similarity, which means that a fractal has self-similarity [1013]. In recent years, fractals have attracted a surge of attention in various scientific fields [14,15]. The fractal theory [16,17] has always been a very popular and active theory. This is due to the self-similar structure that exists and the crucial impact of the idea of fractals on a large variety of scientific disciplines, such as molecular biology, pharmaceutical chemistry, optics, economics, and ecology [18]. In addition, many complex networks and real networks are generated by the self-similar fractal network [1922]. There are many classical fractal models, such as the Cantor set, the Koch curve, and the Sierpinski gasket [23,24]. These structures have obviously become the focus of research, and many potential characterizations have been discovered. In 2536, the network evolved from the Sierpinski carpet and some vital properties of the Sierpinski gasket were considered.

It has a great theoretical and practical significance to study the hitting time of random walks, which is the mean of the first-passage time of a random walker starting from any site on the network to a trap (a perfect absorber). It can characterize various other dynamical processes taking place on the network, such as mobility patterns and virus spreading. For example, in the communication and information industry, the hitting time of a random walk model can be used to study and simulate information transmission and latency, data collection, quantification and the prediction of communication and search costs, etc. In the field of biology, random walk models can be used to study and describe the spread of infectious diseases and metabolic fluxes among organisms. In the computer industry, the study of characteristics results in community detection, computer vision, collaborative recommendation, and image segmentation. It also describes the diffusion efficiency of different networks. Kozak and Balakrishnan [37,38] studied random walks on a two-dimensional Sierpinski gasket, three-dimensional Sierpinski tower, and d-dimensional Sierpinski model and gave the analytical expression of the hitting time. Wu [39] studied the random walk on the half Sierpinski gasket and gave the formula for the hitting time. Qi [40] got the expression of the hitting time for several absorbing random walks on Sierpinski graphs and hierarchical graphs.

In this paper, we study random walks and discuss the hitting time on the Sierpinski network model (SnN) and the half Sierpinski network model (HSnN) obtained by vertically cutting SnN based on the symmetry axis. Compared with SnN, the global self-similarity structure of HSnN is lost, and only the local self-similarity is preserved. We expect to obtain the exact expression of the hitting time on HSnN from the complete symmetry of SnN and show whether there is any effect on the diffusion efficiency of the cut network. The mathematical combination method and fractal theory are applied. The remainder of this paper is organized as follows: in Section 2, we introduce our models. In Section 3, we have a detailed calculation of the hitting time of SnN. Also, the detailed calculation of the hitting time of HSnN is given in Section 4. In the last section, we draw the conclusion.

2 Preliminaries

In this section, we introduce the structure of SnN and HSnN and some concepts about several types of random walks, which will be used in the following.

2.1 The structure of SnN and HSnN

Actually, SnN can be constructed in a nested manner with a self-similar structure. We separately define a triangle and a 3-regular graph as S and N. As shown in Figure 1, we can make three copies of the 3-regular graph N and then embed N into S by nodes to obtain the initial generation, which is recorded as S1N. Making three copies of S1N and then embedding the initial generation S1N into S to produce the second generation is known as S(S1N). For the convenience of the following description, the second generation is abbreviated as S2N. We get the nth generation S(Sn−1N) by repeating the aforementioned process, making three copies of Sn−1N and then embedding the (n−1)th generation Sn−1N into S, which is abbreviated as SnN. Specifically, SnN is divided into three parts marked as Sn1(i)N with i = 1, 2, and 3, according to the structure and iteration method. The upper half of Figure 2 shows the first two generations of SnN. It should be noted that all nodes will be labeled sequentially from the top to the bottom by the site index i. The corner node 1 is the trap node, also called the target node. Otherwise, the corner node 1, the left-hand corner node, and the right-hand corner node of the bottom row on SnN are represented by the set A. Therefore, it is convenient to refer to these three corner nodes as 1, L, and R, respectively. Also, the hitting time is represented by T1(n), TL(n), and TR(n), where n is the generation.

FIGURE 1
www.frontiersin.org

FIGURE 1. Generation process of the initial generation S1N.

FIGURE 2
www.frontiersin.org

FIGURE 2. First two generations of SnN and HSnN for n = 1 and 2.

As shown in the lower half of Figure 2, HSnN is obtained by cutting the corresponding SnN along the vertical symmetry axis. The cutting method of the network cannot equally divide all the nodes because vertices on the partition line will be retained during segmentation.

From the aforementioned construction, we can easily derive the total number of nodes on SnN and HSnN to be

Nn=53n+32,(1)
Hn=Nnn+22+n+2=53n+2n+74.(2)

The three connecting vertices C1, C2, and C3, which are named after connecting the three regions Sn1(i)N(i=1,2,3) on SnN, are marked separately by the numbers as follows: C1=53n1+32n2, C2=C1+2n1=53n1+32, and C3=C2+53n1=53n+32n2. According to the position of the three connecting nodes relative to the trap node 1, we divide them into two categories, denoted by sets Ωn1 and Ωn1, i.e.,

Ωn1=C1,C2,(3)
Ωn2=C3.(4)

In addition, we use Ωnf to denote the set of n non-trap nodes on the vertical secant line, except site 2.

2.2 Calculation of intermediate quantities

The hitting time is the mean of the first-passage time of a random walker starting from any site on the network to a trap node. In order to determine the hitting time for SnN, we introduce the following intermediate quantities, all of which are the probability of a Markov chain on SnN ending at corner node 1. In the process, the chain starts at a certain vertex and stops whenever it visits any of the three corner nodes of SnN, where n is the generation.

pn: The starting state is a corner node other than site 1. At least one transition is performed.

p1(n): The starting state is a special vertex belonging to Ωn1.

p2(n): The starting state is a special vertex belonging to Ωn2.

pn+1=pnp2n+1+pnp1n+1,p1n+1=12pn+1pnp1n+1+12pnp2n+1+12pnp1n+1,p2n+1=12pnp1n+1+12pnp2n+1+12pnp1n+1+12pnp2n+1.(5)

The first equality of the equation group is explained. A random walk in Sn+1N, starting from the corner node L and ending whenever the walker reaches any three corner nodes of Sn+1N, is limited to jumping at least one step. By definition, the walker stops at the corner node R or 1 with probability pn+1. In addition, the walker must first reach a connecting vertex C1 or C3 in order to reach one of the corner nodes R or 1. By definition and symmetry, the probability of reaching each of the connecting vertices C1 or C3 is pn, where the connecting vertex C1 belongs to Ωn+11 and the other connecting vertex C3 belongs to Ωn+12, and the walker has the remaining probability 1−2pn returning to the corner node L, where it stops walking. Therefore, the first equality is obtained.

We next certify the second equality in the equation system (Eq. 5). Considering a random walk in Sn+1N, which starts from the connecting vertex C1 and ends whenever the walker reaches any three corner nodes of Sn+1N, it jumps at least one step. By definition, the probability that the walker stops at corner node 1 is p1(n + 1). The probability of getting in Sn(1)N and Sn(2)N is 12. If it enters Sn(1)N, it has a probability of pn to arrive at corner node 1, where the walker stops jumping. Also, the walker reaches the other two corner nodes of Sn(1)N with probability 1−pn, i.e., connecting vertices C1 and C2 belonging to Ωn+11. As a result, we can write the first item on the right side of the second equality. Similarly, if it enters Sn(2)N, it reaches the corner node L or the connecting vertex C3 with the same probability pn. When it reaches the corner node L, it stops walking. When it reaches the connecting vertex C3, it will continue to walk to the target node. Then, the walker has a probability 1−2pn of returning to the connecting vertex C1. Therefore, we can write the second item on the right side of the second equality. From these analyses, the aforementioned equality is obtained.

Ultimately, we testify to the third equality of the system of Eq. 5. A random walk in Sn+1N, starting from the connecting vertex C3 and ending whenever the walker reaches any three corner nodes of Sn+1N, jumps at least one step. By definition, the probability that the walker stops at corner node 1 is p2(n + 1). The probability of getting into Sn(2)N and Sn(3)N is 12. If it enters Sn(2)N, the probability of the walker reaching the corner node L is pn, and the walker will stop walking at this point. In addition, the probability of the walker reaching the connecting vertex C1 is pn, and the probability of returning to the starting site C3 is 1−2pn. As a result, we can draw up the primary item on the right side of the last equality in the system of Eq. 5. Due to the complete symmetry of Sn+1N, the random walk on Sn(3)N is the same as that of Sn(2)N. Therefore, the last equation is true.

It is easy to know that the initial value p1=415. Through simplification, the final solution is obtained:

pn=41535n1,p1n=25,p2n=15.(6)

We next define the corresponding hitting time. Corner nodes 1, L, and R are represented by set A, where site 1 is set as the trap node; connecting vertices C1, C2, and C3 are indicated by set I.

TL→1(n): The hitting time from the corner node L to the corner node 1 in the nth generation.

TLA(n): The hitting time from the corner node L to any node in set A in the nth generation.

TIA(n): The hitting time from any vertex in set I to any node in set A in the nth generation.

TL1n=TLAn+1pnTL1n,TLAn+1=TLAn+2pnTIAn+1,TIAn+1=12TLAn+1pnTIAn+1+12TLAn+1pnTIAn+1.(7)

We now attest to the first equality in the equation system (Eq. 7). TL→1(n) is the hitting time for a random walk in SnN starting from the corner node L and ending at the trap node 1. According to the structure of SnN, the walker must first reach any of the three corner nodes of SnN in order to reach trap node 1, taking expected timesteps TLA(n). In such a process, the probability of reaching destination node 1 is pn, where the walker stops jumping. Also, the probability of reaching corner nodes R and L is 1−pn, from which the walker must continue to bounce TL→1(n) steps to reach trap node 1. Thus, we get the first expression.

Subsequently, we prove the second equality in the equation system (Eq. 7). TLA(n + 1) is the hitting time for a random walk starting from the corner node L to any of the three corner nodes of Sn+1N for the first time, under the limitation that the walker jumps at least one step. In order to reach any of corner nodes in Sn+1N, the walker starting from the corner node L must first visit one of the corner nodes in SnN. It is worth noting that these points belong to Sn(2)N. This process is expected of TLA(n) timesteps. In this process, there is the same probability of reaching the connecting vertices C1 and C3, which is pn. The probability of returning to the corner node L is 1−2pn, stopping at this point. If the walker reaches any of the connecting vertices C1 and C3, it will continue to jump TIA(n + 1) steps to visit any of the corner nodes of Sn+1N.

Ultimately, we testify to the third equality of the system in Eq. 7. Consider a random walk, which starts from any one of the connecting nodes C1, C2, and C3 and ends whenever it reaches any corner nodes on Sn+1N. By definition, the hitting time is TIA(n + 1). We now study the random walk from the connecting vertex C3, which may perform the following two processes. Both processes happen with the probability of 12. In the first process, the walker goes inside Sn(2)N, taking TLA(n) timesteps to reach the three corner nodes of Sn(2)N. The probability of reaching the corner node L is pn, where the walking process is over. Also, the probability of reaching the other two corner nodes belonging to Sn(2)N is 1−pn, i.e., the connecting vertices C1 and C3. The walker needs to take further TIA(n + 1) timesteps before being absorbed. According to the symmetry of SnN, the second process is the same as the first one.

By substituting the value of pn=415(35)n1 into the aforementioned equation and simplifying it. In addition, it is easy to know TLA(1) = 4, so we can get the following:

TL1n=35n,TLAn=43n1,TIAn=35n1.(8)

3 Formula of hitting time on Sn◦N

The Sierpinski network in any given generation n, using arrays (a, b, c) to represent a piece of interior points, for instance, (2, 5, 6) or (10, 16, 17), as shown in Figure 3; let (I1, J1, K1) label the three vertices of the smallest triangle containing the three interior points (a, b, c), simultaneously, for instance, (1, 7, 9) or (7, 20, 22). According to the numerical results, the hitting time can be rewritten as follows:

Tan+Tbn+Tcn=TI1n+TJ1n+TK1n+9.(9)

FIGURE 3
www.frontiersin.org

FIGURE 3. Generation of the n = 3 Sierpinski network.

Let (i1, j1, k1) label the three sites, which are one of any minimum size 1 lacunary triangle on SnN. For example, (3, 4, 8) or (12, 13, 21); (I1, J1, K1) also label the three vertices of the triangle containing (i1, j1, k1) as its central lacunary region, such as (1, 7, 9) or (7, 20, 22), referring to Figure 3. According to the numerical results, it is easy to see the following:

Ti1n+Tj1n+Tk1n=TI1n+TJ1n+TK1n+950.(10)

In the same way, we now let (i2, j2, k2) denote the three vertices of a lacunary region of size 2 in the network, such as (7, 9, 22) or (35, 37, 63); (I2, J2, K2) label the three vertices of the triangle containing (i2, j2, k2) as its central lacunary region, such as (1, 20, 24) or (20, 61, 65). It then follows the scaling derived previously that is as follows:

Ti2n+Tj2n+Tk2n=TI2n+TJ2n+TK2n+951.(11)

Therefore, moving up the hierarchy, if (ir, jr, kr) are the sites demarcating a lacunary triangle of size r in the ascending order of size, starting from the smallest in size 1, and if (Ir, Jr, Kr) label the vertices of the triangle with (ir, jr, kr) as the central lacunary region, then

Tirn+Tjrn+Tkrn=TIrn+TJrn+TKrn+95r1.(12)

The foregoing suggests how the hitting time Ttotal(n) may be computed for the arbitrary n. This is carried out by suitably regrouping the terms in the sum i=2NnTi(n) and systematically and repeatedly using Eq. 12 as one moves upward through triangles of increasing sizes. It needs some combinatorics and involves the enumeration of the number of lacunary triangles of each size in the network. The final result can be expressed entirely in terms of the known numerical factors and the combination T1(n)+TL(n)+TR(n). Since T1(n) ≡ 0, while TL(n) = TR(n) = 3 ⋅ 5n, this leads directly to the desired expression for Ttotal(n). As an illustration of the procedure, consider the network of generation n = 3, with Nn = 69. Dropping for a moment the generation superscript for brevity and with L = 61 and R = 69, as shown in Figure 3, we obtain the following:

Ttotal3=i=269Ti3=3T1+TL+TR+329+32950+530T1+TL+TR+31951+31T1+TL+TR+30952.(13)

Thus, Ttotal(3) has been recast in terms of the sum (T1 + TL + TR) of the hitting time from the three primary sites. The meaning of 32 of the second term on the right side of the equation is that there are nine pieces of interior points in S3N. It should be noted that the modulus 32 of the third term represents the number of regions of size 1, the coefficient 31 of the factor multiplying 9 ⋅ 51 is the number of lacunary triangles of size 2, and 30 of the factor multiplying 9 ⋅ 52 is the number of lacunary triangles of size 3 on the n = 3 network.

We may now carry out a similar procedure for the case of general n. The analog of Eq. 13 yields the following:

Ttotaln=i=2NnTin=3+5m=0n23mT1n+TLn+TRn+23n19+3n295m=1n15m.(14)

The numerical value is substituted to get the following result:

Ttotaln=2545n3n+35n143n.(15)

Therefore, the hitting time on SnN is as follows:

T̄n=1Nn1Ttotaln=1Nn1i=2NnTin=255n3n+125n3n23n5+1.(16)

4 Formula of hitting time on HSn◦N

We divide the random walk into two processes on SnN and HSnN, except node 2. The first process is that a walker starts from the starting point to node 3 or 4, which is the sum of the hitting time called Tg(n). The second procedure is a random walk from node 3 or 4 to the trap node, which is called T3(n). In addition, T2(n) denotes the hitting time from site 2 to trap node 1.

Similarly, the first process of HSnN is a random walk from any site to node 3, and the hitting time of this process is recorded as Hg(n). The second process is recorded as H3(n), and H2(n) represents the hitting time from site 2 to trap node 1 on HSnN. Thence, we have the following equations:

Ttotaln=Tgn+Nn2T3n+T2n,Htotaln=Hgn+Hn2H3n+H2n.(17)

Let Tr(n) be the mean of the first return time for a random walker starting from node 3 in the first process of HSnN. Then, Tr(n) can also be the mean of the first return time to node 3 or 4 in the first process of SnN. Therefore, according to the structure of HSnN and SnN, we have the following relationship:

T3n=16+161+T2n+161+T3n+36Trn+T3n,H3n=15+151+H2n+35Trn+H3n.(18)

Moreover, from the numerical results, we have T2(n) = 3 ⋅ 3n and H2(n) = 2 ⋅ 3n. So, we get the following relation:

T3nH3n=123n+1.

Because the nodes on the cut line are retained, the hitting time Ti(n) from any node i on the secant line to the goal node 1 is also divided into two parts. The first process is a random walk from node i to node 3 or 4, which is denoted as Ti→3,4(n). The hitting time of the second process is denoted as T3(n), which represents a random walk from site 3 to destination node 1. Therefore, Ti(n) can be rewritten as follows:

Tin=Ti3,4n+T3n.(19)

Consequently, the formula for the hitting time of nodes that belong to Ωnf is as follows:

Tfn=iΩnfTi3,4n+T3n=T̄fn+nT3n.(20)

In SnN, in addition to the nodes on the secant line, other nodes are evenly divided on both the sides in the segmentation process. HSnN contains the nodes on the left half of the secant line and the nodes in set Ωnf. Therefore, it can be obtained by the following:

Hgn=12TgnT̄fn+T̄fn.(21)

Eqs 17 and 20 are inserted into the aforementioned formula to get the following solution:

Hgn=12TtotalnNn+n2T3nT2n+Tfn.(22)

Then, substituting the aforementioned expression (Eq. 22) into the second formula in the equation group (Eq. 17), we get the following:

Htotaln=Hgn+Hn2H3n+H2n=12TtotalnNn+n2T3nT2n+Tfn+Hn2H3n+H2n=12Ttotaln3n+12Nn+n2+3n+Tfn.(23)

We focus on solving the expression of Tf(n). In order to facilitate the calculation, we rewrite the three connecting vertices C1, C2, and C3 of SnN as dn, en, and fn, respectively. According to the structural characteristics of SnN, the sites dn and en in the nth generation can be labeled as the corner nodes Ln−1 and Rn−1 in the (n−1)th generation. The labeling method of nodes on SnN can be seen in Figure 4.

FIGURE 4
www.frontiersin.org

FIGURE 4. Labeling method of nodes on SnN.

If corner nodes 1, Ln, and Rn are set as goal nodes, then the walker starting from site fy(y = 1, …, n) is captured by the trap set A after 3 ⋅ 5y−1 random walks on average in SnN, which can be seen from the analysis of the equation group (Eq. 7) and results. In addition, the arriving node Ly or Ry has a probability of 25. Thus, Tfy(n)(y=1,,n) can be denoted as follows:

Tfyn=35y1+25TLyn+25TRyn=35y1+45TLyn=35y1+45Tdy+1n.

Similarly, starting from the point dy+1(y = 1,…, n) and getting to the site Ly or Ry has a probability of 25 after 3 ⋅ 5y random walks on average. Then, the walker is captured by the trap set A. In addition, there are 25 and 15 probabilities reaching nodes Ly+1 and Ry+1, respectively. Therefore, the aforementioned equation can be expressed as follows:

Tfyn=35y1+4535y+25TLy+1n+15TRy+1n=35y1+4535y+4535TLy+1n==35y1+45y1k=1ny3k+4535nyTLnn=35y1+45y1k=1ny3k+4535ny35n=185y13ny35y1.(24)

Here, TLn(n)=35n and the expression for the hitting time of nodes that belong to Ωnf is as follows:

Tfn=iΩnfTin=y=1nTfyn=y=1n185y13ny35y1=3345n+93n+34.(25)

Therefore, substituting Eq. 15 and Eq. 25 into Eq. 23, the expression of Htotal(n) is as follows:

Htotaln=122545n3n+4545n3743n5432nn3n+12+1.(26)

Then, the hitting time on HSnN is as follows:

H̄n=1Hn1Htotaln=1Hn1i=2HnHin=253n+2n+32545n3n+4545n3743n5432nn3n+12+1.(27)

In order to compare it with the exact formula for the hitting time of a random walk on SnN and HSnN, we draw the numerical simulation diagram of T̄(n) and H̄(n) for n = 1, 2, …, 7, as shown in Figure 5. The figure shows that the difference in the hitting time between SnN and HSnN is small when n is large enough. Therefore, the curves of both the networks are nearly merged for large scales, which indicate that the diffusion efficiency of HSnN is consistent with SnN for a large scale.

FIGURE 5
www.frontiersin.org

FIGURE 5. Numerical simulation diagram of T̄(n) and H̄(n).

5 Conclusion

In this paper, we study analytically the unbiased random walk on the Sierpinski network (SnN) and the half Sierpinski network (HSnN), which is obtained by vertically cutting SnN along the symmetry axis. After cutting, the global self-similarity of SnN is destroyed, but only the local self-similarity is maintained. We have analytically obtained the closed-form expression of the hitting time for a random walk on the nth generation HSnN, which is H̄(n)=253n+2n+3[2545n3n+4545n3743n5432nn(3n+1)2+1]. However, the hitting time of SnN is found to be T̄(n)=255n3n+125n3n2(3n5+1). The hitting time is the quantity that characterizes the diffusion efficiency of the network. The curves of the two networks show that the hitting time of HSnN is practically similar compared with SnN when n is large enough, and our results show that the diffusion efficiency of HSnN has little effect compared with SnN at a large scale. Our work is further helpful in understanding the properties of Sierpinski networks.

Data availability statement

The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding author.

Author contributions

All authors listed have made a substantial, direct, and intellectual contribution to the work and approved it for publication.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

The handling editor declared a shared affiliation with the authors at the time of review.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Strogatz SH. Exploring complex networks. nature (2001) 410:268–76. doi:10.1038/35065725

PubMed Abstract | CrossRef Full Text | Google Scholar

2. Wang XF, Chen G. Synchronization in scale-free dynamical networks: Robustness and fragility. IEEE Trans Circuits Syst (2002) 49:54–62. doi:10.1109/81.974874

CrossRef Full Text | Google Scholar

3. Guimera R, Amaral LAN. Functional cartography of complex metabolic networks. nature (2005) 433:895–900. doi:10.1038/nature03288

PubMed Abstract | CrossRef Full Text | Google Scholar

4. Grubesic TH, Matisziw TC, Zook MA. Global airline networks and nodal regions. GeoJournal (2008) 71:53–66. doi:10.1007/s10708-008-9117-0

CrossRef Full Text | Google Scholar

5. Deng F-G, Li X-H, Li C-Y, Zhou P, Zhou H-Y. Quantum secure direct communication network with einstein–podolsky–rosen pairs. Phys Lett A (2006) 359:359–65. doi:10.1016/j.physleta.2006.06.054

CrossRef Full Text | Google Scholar

6. Batool A, Pál G, Danku Z, Kun F. Transition from localized to mean field behaviour of cascading failures in the fiber bundle model on complex networks. Chaos, Solitons & Fractals (2022) 159:112190. doi:10.1016/j.chaos.2022.112190

CrossRef Full Text | Google Scholar

7. Cotilla-Sanchez E, Hines PD, Barrows C, Blumsack S, Patel M. Multi-attribute partitioning of power networks based on electrical distance. IEEE Trans Power Syst (2013) 28:4979–87. doi:10.1109/tpwrs.2013.2263886

CrossRef Full Text | Google Scholar

8. Jung J, Jin W, Kang U. Random walk-based ranking in signed social networks: Model and algorithms. Knowl Inf Syst (2020) 62:571–610. doi:10.1007/s10115-019-01364-z

CrossRef Full Text | Google Scholar

9. Bai S, Niu M. Spectral properties of a class of treelike networks generated by motifs with single root node. Mod Phys Lett B (2022) 36:2250038. doi:10.1142/s0217984922500385

CrossRef Full Text | Google Scholar

10. Li B-G, Yu Z-G, Zhou Y. Fractal and multifractal properties of a family of fractal networks. J Stat Mech (2014) 2014:P02020. doi:10.1088/1742-5468/2014/02/p02020

CrossRef Full Text | Google Scholar

11. Zhou Y, Leung Y, Yu Z-G. Relationships of exponents in two-dimensional multifractal detrended fluctuation analysis. Phys Rev E (2013) 87:012921. doi:10.1103/physreve.87.012921

PubMed Abstract | CrossRef Full Text | Google Scholar

12. Chen J, Dai M, Wen Z, Xi L. A class of scale-free networks with fractal structure based on subshift of finite type. Chaos (2014) 24:043133. doi:10.1063/1.4902416

PubMed Abstract | CrossRef Full Text | Google Scholar

13. Wang Q, Xi L, Zhang K. Self-similar fractals: An algorithmic point of view. Sci China Math (2014) 57:755–66. doi:10.1007/s11425-013-4767-x

CrossRef Full Text | Google Scholar

14. Babič M, Mihelič J, Calì M. Complex network characterization using graph theory and fractal geometry: The case study of lung cancer dna sequences. Appl Sci (2020) 10:3037. doi:10.3390/app10093037

CrossRef Full Text | Google Scholar

15. Wang Z, Zhou Y, Bajenaid AS, Chen Y. Design of wireless sensor network using statistical fractal measurements. Fractals (2022) 30:2240092. doi:10.1142/s0218348x22400928

CrossRef Full Text | Google Scholar

16. Klafter J, Blumen A, Zumofen G. Fractal behavior in trapping and reaction: A random walk study. J Stat Phys (1984) 36:561–77. doi:10.1007/bf01012922

CrossRef Full Text | Google Scholar

17. Zhang P, Zhang Y, Huang Y, Xia Y. Experimental study of fracture evolution in enhanced geothermal systems based on fractal theory. Geothermics (2022) 102:102406. doi:10.1016/j.geothermics.2022.102406

CrossRef Full Text | Google Scholar

18. Blumen A, Klafter J, Zumofen G. Trapping and reaction rates on fractals: A random-walk study. Phys Rev B (1983) 28:6112–5. doi:10.1103/physrevb.28.6112

CrossRef Full Text | Google Scholar

19. Rammal R. Random walk statistics on fractal structures. J Stat Phys (1984) 36:547–60. doi:10.1007/bf01012921

CrossRef Full Text | Google Scholar

20. Hughes B, Montroll E, Shlesinger M. Fractal and lacunary stochastic processes. J Stat Phys (1983) 30:273–83. doi:10.1007/bf01012302

CrossRef Full Text | Google Scholar

21. Mandelbrot BB, Mandelbrot BB. The fractal geometry of nature, 1. New York: W. H. Freeman (1982).

Google Scholar

22. Chen J, Dai M, Wen Z, Xi L. Trapping on modular scale-free and small-world networks with multiple hubs. Physica A: Stat Mech its Appl (2014) 393:542–52. doi:10.1016/j.physa.2013.08.060

CrossRef Full Text | Google Scholar

23. Barlow MT, Bass RF. Transition densities for brownian motion on the sierpinski carpet. Probab Theor Relat Fields (1992) 91:307–30. doi:10.1007/bf01192060

CrossRef Full Text | Google Scholar

24. Zhou Z, Wu M. The hausdorff measure of a sierpinski carpet. Sci China Ser A-math (1999) 42:673–80. doi:10.1007/bf02878985

CrossRef Full Text | Google Scholar

25. Kajino N. Heat kernel asymptotics for the measurable riemannian structure on the sierpinski gasket. Potential Anal (2012) 36:67–115. doi:10.1007/s11118-011-9221-5

CrossRef Full Text | Google Scholar

26. Grabner PJ. Functional iterations and stopping times for brownian motion on the sierpiński gasket. Mathematika (1997) 44:374–400. doi:10.1112/s0025579300012699

CrossRef Full Text | Google Scholar

27. Wu S, Zhang Z, Chen G. Random walks on dual sierpinski gaskets. Eur Phys J B (2011) 82:91–6. doi:10.1140/epjb/e2011-20338-0

CrossRef Full Text | Google Scholar

28. Wu S, Zhang Z. Eigenvalue spectrum of transition matrix of dual sierpinski gaskets and its applications. J Phys A: Math Theor (2012) 45:345101. doi:10.1088/1751-8113/45/34/345101

CrossRef Full Text | Google Scholar

29. Guyer R. Diffusion on the sierpiński gaskets: A random walker on a fractally structured object. Phys Rev A (Coll Park) (1984) 29:2751–5. doi:10.1103/physreva.29.2751

CrossRef Full Text | Google Scholar

30. Hattori K. Displacement exponent for loop-erased random walk on the sierpiński gasket. Stochastic Process their Appl (2019) 129:4239–68. doi:10.1016/j.spa.2018.11.021

CrossRef Full Text | Google Scholar

31. Lara PCS, Portugal R, Boettcher S. Quantum walks on sierpinski gaskets. Int J Quan Inform (2013) 11:1350069. doi:10.1142/s021974991350069x

CrossRef Full Text | Google Scholar

32. Bedrosian SD, Sun X. Theory and application of pascal-sierpinski gasket fractals. Circuits Syst Signal Process (1990) 9:147–59. doi:10.1007/bf01236448

CrossRef Full Text | Google Scholar

33. Shima T. On eigenvalue problems for the random walks on the sierpinski pre-gaskets. Jpn J Ind Appl Math (1991) 8:127–41. doi:10.1007/bf03167188

CrossRef Full Text | Google Scholar

34. Chen J, Gao F, Le A, Xi L, Yin S. A small-world and scale-free network generated by sierpinski tetrahedron. Fractals (2016) 24:1650001. doi:10.1142/s0218348x16500018

CrossRef Full Text | Google Scholar

35. Chen J, Le A, Wang Q, Xi L. A small-world and scale-free network generated by sierpinski pentagon. Physica A: Stat Mech its Appl (2016) 449:126–35. doi:10.1016/j.physa.2015.12.089

CrossRef Full Text | Google Scholar

36. Xi L. Differentiable points of sierpinski-like sponges. Adv Math (2020) 361:106936. doi:10.1016/j.aim.2019.106936

CrossRef Full Text | Google Scholar

37. Kozak JJ, Balakrishnan V. Analytic expression for the mean time to absorption for a random walker on the sierpinski gasket. Phys Rev E (2002) 65:021105. doi:10.1103/physreve.65.021105

PubMed Abstract | CrossRef Full Text | Google Scholar

38. Kozak JJ, Balakrishnan V. Exact formula for the mean length of a random walk on the sierpinski tower. Int J Bifurcation Chaos (2002) 12:2379–85. doi:10.1142/s0218127402006138

CrossRef Full Text | Google Scholar

39. Wu B, Zhang Z. The average trapping time on a half sierpinski gasket. Chaos, Solitons & Fractals (2020) 140:110261. doi:10.1016/j.chaos.2020.110261

CrossRef Full Text | Google Scholar

40. Qi Y, Dong Y, Zhang Z, Zhang Z. Hitting times for random walks on sierpiński graphs and hierarchical graphs. Comp J (2020) 63:1385–96. doi:10.1093/comjnl/bxz080

CrossRef Full Text | Google Scholar

Keywords: hitting time, half Sierpinski networks, vertical cutting, random walk, fractal

Citation: Sun Y, Liu X and Li X (2022) Hitting time for random walks on the Sierpinski network and the half Sierpinski network. Front. Phys. 10:1076276. doi: 10.3389/fphy.2022.1076276

Received: 21 October 2022; Accepted: 23 November 2022;
Published: 09 December 2022.

Edited by:

Dun Han, Jiangsu University, China

Reviewed by:

Lifeng Xi, Ningbo University, China
Zu-Guo Yu, Xiangtan University, China
Min Niu, University of Science and Technology Beijing, China

Copyright © 2022 Sun, Liu and Li. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Yu Sun, c3VueXU4OHN5QDE2My5jb20=

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.