<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>December</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Relaxation  Time  as  Unique  Characteristic  for  Networks  Clustering</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Andrii Snarskii</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Lande</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Dmytrenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Information Recording of National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>2, Mykoly Shpaka Street, Kyiv, 03113</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University «Igor Sikorsky Kyiv Polytechnic Institute»</institution>
          ,
          <addr-line>37, Prosp. Peremohy, Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>9</volume>
      <issue>2021</issue>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>   This paper researches new unique characteristics of networks - a network relaxation time and an individual node relaxation time, which characterize the stability of a complex network and, accordingly, each node separately to external perturbations. While researching of the complex networks, it is assumed that relaxation time is the number of iterative steps of the corresponding algorithm required to achieve the initial equilibrium numerical values of a certain characteristic after some external perturbation. In other words, the network relaxation time for each node characterize the resistance of a complex network and the individual node relaxation time characterize the resistance of each node to external perturbations, accordingly. In this work, to compute the relaxation time, the decelerated iterative HITS algorithm is used. It is shown, that these characteristics are unique numerical characteristic of network nodes, and they can be used to find the centroids of clusters and combine nodes into groups according to these characteristics - for complex networks clustering. The approbation of the presented characteristics of the relaxation time and the individual relaxation time was carried out on the example of clustering of random networks with clearly expressed clusters. In particular, a randomly generated matrix with dimension 30×30 and 3 clusters and a matrix with dimension 100×100 and 4 clusters were researched.</p>
      </abstract>
      <kwd-group>
        <kwd> 1  Complex Network</kwd>
        <kwd>Network Relaxation Time</kwd>
        <kwd>Individual Node Relaxation Time</kwd>
        <kwd>HITS</kwd>
        <kwd>PageRank</kwd>
        <kwd>Clustering</kwd>
        <kwd>Centroids of Clusters</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction </title>
      <p>
        Complex networks are widespread in nature and technology. For example, networks such as the World
Wide Web, peer-to-peer networks [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and others are complex [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. They have non-trivial topological
properties and, therefore, are of great interest to research.
      </p>
      <p>
        Despite the fact that various networks, such as electrical, transport, and information networks, fall
within the scope of the consideration of the theory of complex networks, the greatest contribution to
the development of this theory is made by research of social networks [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], where binary relationships
between people in a group can be represented in the form of a network, so these networks also play an
important role. In these networks, each object is a node, and connections between nodes are an edge or
link [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
      <p>
        An analysis of complex networks that includes the study of statistical and dynamical structural
properties changes that characterise their behaviour, as well as the prediction of the evolution of such
networks, are important directions [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Division of a set of network nodes (objects) into subsets (clusters), within which these objects are
strongly connected, and the connection between individual clusters is relatively small, i.e. partitioning
into clusters and, for example, detecting communities in social networks [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ] is an urgent task.
. 

∈
∈
→ 
, 
→ 
. 
      </p>
      <p>
        There are many methods of clustering graphs of complex networks [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ], which differ in the idea
of combining similar nodes. Since different models use different algorithms, different clustering models
are distinguished, in particular, such as connectivity models, centroid, statistical, group, neural models
and others. For example, there are models based on connectivity. In these models, objects that are closer
in space are more similar (related). And also, there are models based on finding the centroid. In these
models, clusters are represented in the form of a central vector.
      </p>
      <p>
        In this work, we propose to use a new characteristic for clustering complex networks – the relaxation
time [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ].
2. Cluster network analysis  
Cluster network analysis, as a rule, solves the problem of two-criteria optimization, namely:
1. Within each cluster  , elements (nodes) should be connected as much as possible, that is
Hereinafter,
      </p>
      <p>
        is some estimate of the relationship between the elements with indices  and  , which
are included in the cluster  . 
ways, for example, as the shortest path between nodes  and  [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>can take non-negative values. This estimate can be calculated in various
2. The connectivity between any separate different clusters, for example, 
and 
should be
minimal, that is
(1) 
(2) 
 
 
(3) 
(4) 
Often, in the general case, the sums for all indices are estimated ( is a number of clusters):

 
2</p>
      <p>, 
By association, in our case, the first factor in the formula for determining the weight 
corresponds
to the first requirement, if it is of great importance, then it is connected by strong ties with a certain
bonds are concentrated within their own group (cluster) – this corresponds to requirement 2.
number of nodes (including from its own group). If the parameter  is of great importance, then the</p>
      <p>We can assume that the individual nodes with the highest discriminant weight (the number chosen
in advance) will constitute the centroids for clustering, or the basis for formation of clusters that will
form the basis of the clusters.</p>
      <p>
        There are numerous clustering algorithms such as K-means [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], LSA/LSI [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], most of which are
used for networks. Recently, the algorithm based on the modularity property has been widely used due
to the fact that it is built into the Gephi system [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        By definition, modularity is equal to the proportion of the total number of edges that fall into a given
cluster minus the predicted numbers of edges that would fall into the same groups if they were randomly
distributed. The value of modularity lies in the interval [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ]. For a given partitioning of network nodes
into clusters, modularity shows how many links in clusters in comparison to the links that are randomly
distributed between all nodes without paying attention to clusters. There are various methods for
calculating modularity. In the most commonly accepted version of the concept, edges are randomized
in such a way that the degree of each node is preserved. The difference between the real number of
edges between nodes  and  and the predicted number of edges between them is
where  is a number of edges in network,  and  are degrees of the nodes  and  , respectively.
      </p>
      <p>The modularity is defined as the sum of all pairs
where  is Kronecker delta (shows whether nodes  and  are in the same cluster).</p>
      <p>The matrix formulation of modularity is as follows. By definition, if the node belongs to the cluster
then 
is equal to 1and else it is equal to 0. Then
1
2


,</p>
      <p>,</p>
      <p>2
 
2</p>
      <p>,  ,  
 ,</p>
      <p> 

, 
1
2
,
 

1
2
,

(5) 
(6) </p>
      <p> 
(7) 
(4).
where  is a matrix, having elements</p>
      <p>, and  is the so-called modularity matrix, which has elements</p>
      <p>The modularity of a network without clusters is equal 0 cause the sum of all columns and rows of
the matrix that corresponds modularity is equal to 0.
3. Physical meaning of relaxation time 
In physics, relaxation is understood as the process of establishing thermodynamic (including stochastic)
(temperature, charge density, etc.) has the value 
 that go to equilibrium is given by the kinetic equation
і | 
|/</p>
      <p>≪ 1, then in the first approximation

 
→
lim 
, 

  
0
  </p>
      <p> </p>
      <p>0  
charge distribution is resolved, i.e., the equilibrium is reached faster.
i.e., the higher conductivity  and the lower relative permittivity  , the faster the heterogeneity of the
The concept of relaxation is used in the methods for approximate solution of systems of linear equations,
in iterative methods, for example, in methods of coordinate relaxation, block and group relaxation, etc.
function</p>
      <p>These examples can be described in the following terms. Let us consider a system of equations  ⃗
0, the solution of which is the function  . To find solutions, some initial approximation 
of the
is chosen and such an iterative procedure is found. In explicit form it is represented as
or in implicit form as
that is, there is such an operator  that
(19) 
The solution of this equation is</p>
      <p>where 0</p>
      <p>is an initial perturbation, and
is a relaxation time.
equation and Ohm's law⃗</p>
      <p>⃗ are can be written as
where  ⃗ is an electric field strength, ⃗ is a charge density.</p>
      <p>In the simplest case of a homogeneous environment
the next equation immediately follows
where the relaxation time is</p>
      <p>So, for example, for an environment with conductivity  and the relative permittivity  , Maxwell's

⃗ 4,
the only way.
state of the system is given by equations (11-12)</p>
      <p>Here we assume an approach and terminology that allows us to consider the described methods in
Let us consider a system described by a set of parameters (numbers, functions)  . The equilibrium
is a solution for which 
equilibrium by defining some set</p>
      <p>defines the equilibrium state of the system. Let's perturbing the system out of</p>
      <p>. By choosing some iterative scheme (15), we get the sequence
where  is considered as the discrete time.
if</p>
      <p>In the usual case, for a descending sequence| 
|, |</p>
      <p>|, … let’s define a value △, such that


△
convergence (usually △=10-4).
that value  , which determines (20) will be considered (called) as the relaxation time  
.</p>
      <p>So, in the case of researching complex networks, the relaxation time is the number of iterative steps
 of the corresponding algorithm, which are necessary to reach the initial equilibrium numerical values
of a certain characteristic after its perturbation with some predetermined accuracy △ – the condition of</p>
      <p>When the recovery of the whole network is researched, the number of iteration steps required for
the value of each node to recover (the whole network is recovered) is called the relaxation time of the
network 
after the perturbation of a certain m-th node or 

(k = 1,..,N, where N is a number
of nodes in network). And the number of iterations which are required to recover the particular node
whose numerical value was perturbated, will be called the individual relaxation time indicator of the
node</p>
      <p>(or simply 
the node after its perturbation.</p>
    </sec>
    <sec id="sec-2">
      <title>4. Algorithm </title>
      <p>
        ). That is, the first characteristic characterizes the node in terms of the stability
of the whole network after an external perturbation, the last one characterizes the individual stability of
For example, let's consider some complex network (a directed graph), for which PageRank [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] (
each node) can be found. PageRank is one of the algorithms for evaluating the importance and ranking
of
of web pages by hyperlinks, it was created by Sergey Brin and Larry Page in 1996 at Stanford
University. The principle of calculating the PageRank of nodes is based on the model of "random
wandering" of the user according to the following algorithm: he opens a random node (web page) from
which he goes by a randomly selected link. It then moves to another web page and activates a random
link again, and so on, constantly going from page to page, never coming back. Sometimes, when, with
some probability 1
      </p>
      <p>, he gets bored with this wandering, or the page does not have links to other
pages, he goes to a random web page again – not by a link, but by manually typing in some URL. It is
assumed that the probability that a user wandering the network will go to a certain web page is its rank.
Obviously, a node's PageRank is higher the more other nodes link to it, and the more popular those
nodes are.
its URL explicitly.</p>
      <p>Let's assume, there are n nodes  , 
, . . ,</p>
      <p>that refer to some node (web page  ), and 
the total number of links from a node to other nodes. Some fixed value  is defined as the probability
that the user, viewing any web page from the set  , will go to the node  by a link, and not by typing
is
that the user will be at this node at some random moment in time:
1</p>
      <p>Within the framework of the model, the probability of this user continuing to surf the web from 
web pages without using links, by manually entering an address (URL) from a random page will be
(alternative to following links). The PageRank index for a node is considered as the probability
According to this formula, the node rank is calculated by a simple iterative algorithm.
In a complex network of 
nodes, the 
value of each node 
,  1,2, … , 
determines the
equilibrium state of this network. After selecting the value of 
value 
the number of steps  for which
0 , the iterative procedure for finding</p>
      <p>for each node  that deviates from the
is used. The relaxation time of node  is
 
(21) 
(22) </p>
      <p>Let introduce the relaxation time of the k-th node in the complex system –  . At the initial stage, a
set of values of nodes</p>
      <p>(  ⃑ is a vector form) define as the equilibrium state. This state is determined
in accordance with the certain rule, for example, – the HITS or PageRank iterative algorithm, or any
rewritten in iterative form:</p>
      <p>Calculation of  ⃑ in accordance with the selected rule (the iterative algorithm) can always be
 ⃑ 1 
⃑ 
,  0,1, …
     
where the numbers of nodes correspond to the vector elements numbers of  ⃑;  is the operator of one
the iterative HITS or PageRank algorithms that are considered in this work;  ⃑0
is the initial values of</p>
      <p>Note that there are different variants of setting initial values (deviations) for nodes. They can be the
same, they can alternately set the deviations of individual nodes, leaving others at equilibrium values,
etc.
to the formulas:</p>
      <p>
        In this work, as a characteristic whose numerical value is perturbated, a characteristic corresponding
to the iterative HITS (Hyperlink Induced Topic Search) rank algorithm was used. This algorithm was
proposed and developed in 1998 by J. Kleinberg [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] to select the best "authors" (primary sources that
refer to other documents) and "hub" (documents that refer to these primary sources) from an array of
documents. For each document j, its authority 
(Authority) and hub ℎ
      </p>
      <p>are calculated according
 
∑→ ℎ , ℎ 
∑→</p>
      <p>,
 ⃑
. 
 ⃑0  
→
⃑
,  0,1, …</p>
      <p>      
  ⃑0 0</p>
      <p> 
 ⃑ 0  ⃑ 
 ⃑ ,   
other.
nodes.
and, respectively
(23) 
(24) 
(25) 
(26) 
(27) 
(28) 
(29) 
(30) </p>
      <sec id="sec-2-1">
        <title>The initial values of nodes  ⃑0</title>
        <p>is considered as the solution –  ⃑ (these values are equilibrium).</p>
        <p>Next, we propose to make some deviation of the score (called perturbation) of the m-th node, as it is
shown in the next example:
symbol.
where  defines the deviation (perturbation) score of the m-th vector element; 
is the Kronecker</p>
        <p>The described above means vector forms of the deviation from the equilibrium state one of the
leads a non-equilibrium state of the system.
elements of the vector  ⃑. The perturbation of vector  ⃑ due to the perturbation of one of its elements
According to the equation (24), for n=0 it can be rewritten:
 
0
∑   0 , 
 
taking into account (27) it looks as follows:
where the vector 
∑</p>
        <p>can be defined as

⎛
⎜
⎜</p>
        <p>⎝


:
:
0

 1 
∑  

∑</p>
        <p>,   
,  
0
0
:
⎞ ⎛ : ⎞
⎟ ⎜
⎟ ⎜
⎟
⎟
⎠ ⎝ 0 ⎠



⎛
⎜
⎝
:
:
⎜ : ⎟
⎟  .</p>
        <p> 
⎞
⎠
 
after increasing a number of iterations n in accordance to (25).</p>
        <p>Taking into account the initial condition  1
come back to the initial equilibrium state  ⃑
decrease and convergence to the value μ.
,  
is the k-th node relaxation time after the perturbation of the m-th node, when the
Figure 2: Shema of values convergence the of the k‐th node </p>
      </sec>
      <sec id="sec-2-2">
        <title>The value</title>
        <p>following condition is satisfied</p>
        <p>
          In the other words, the maximum value of 
node is the network relaxation time [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] for the m-th node.
        </p>
        <p />
        <p>.
for ∀ 

node.
5. Deceleration of algorithm 
after the perturbation of the m-th</p>
        <p>And respectively, the relaxation time of perturbed node called the individual relaxation time of this
When calculating the relaxation time for many small networks, a problem arises, which is that the
relaxation time (a discrete number of algorithm steps) can be very small, that is, the effect of "small
distributive force" occurs. To solve this problem, it is proposed to apply an artificial deceleration of the
iterative algorithm. That is, the so-called decelerated iterative algorithms for HITS and PageRank can
be used to calculate the relaxation time. Cause the number of connections between the nodes is large,
the process of iterative recalculation of the values of the nodes after perturbation of some node and
achieving their initial values is fast. It means that we need to make only a few iterative steps to achieve
the initial equilibrium state of nodes after perturbation. In other words, a network relaxation is fast. In
order to decelerate the relaxation time, we propose to decelerate the HITS or PageRank algorithm,
respectively. After the deceleration, the process of convergence to the equilibrium initial values of nodes
after their perturbation will be slowed. So, the corresponding decelerated HITS or PageRank algorithm
is applied</p>
        <p>→. . . . → 
 , 
 , 
 , 
where 0  1
is a deceleration factor,  is the HITS or PageRank algorithm operator.
(31) 
(32) 
(33) 
(34) 
6. Examples of network analysis 
characteristic ℎ
chosen individually.</p>
        <p>
          Research of complex networks shows that the values of the network characteristics of nodes after
external perturbation and the next recalculation of these characteristics, recover their initial equilibrium
values during some individual time for each node. Comparing the relaxation time with the network
characteristic, the value of which was perturbated, a vague dependence exists, which shows that the
relaxation time is a unique and incomparable numerical characteristic of network nodes [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>Within this work, the individual relaxation time 
is researched, i.e., the relaxation time of the
node, which was deviated from the equilibrium state. In this case, we will further use the notation 
omitting the upper symbol in</p>
        <p>.</p>
        <p>Also in the work, the general relaxation time of the network for the  -th node is researched –
the highest value of 
among ∀</p>
        <p>when the  -th node was disturbed.</p>
        <p>The approbation of the presented characteristics of the relaxation time and the individual relaxation
time was carried out on the example of clustering of random networks with clearly expressed clusters.
In particular, a randomly generated matrix with dimension 30×30 and 3 clusters and a matrix with
dimension 100×100 and 4 clusters were researched.</p>
        <p>For each network described by the corresponding matrix, after perturbing the value of the network
using decelerated HITS algorithm, the network relaxation time and the individual
node relaxation time were calculated. For each network, the deceleration factor  of the HITS algorithm
and the convergence condition  of the numerical values ℎ
and 
to the preperturbed values were</p>
        <p>Also, in order to avoid large numerical values that sometimes arise after the using of decelerated
algorithms, all the resulting values of the relaxation time indicators were normalized in the interval
according to the modularity class (figures 3(a) and 4(a)) and by the network relaxation time and the
individual node relaxation time (for the presented examples, the normalized numerical values of these
characteristics coincide and are presented in the form of node labels – Figures 3(b) and 4(b)).</p>
        <p>The relaxation time of the network, which presented in Figure 1, was obtained as a result of
deceleration the HITS algorithm with a deceleration factor  0.9
10
. For the network presented in figure 2 –  0.9
та  10
.</p>
        <p>and convergence condition 
(a)
(b)</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>7. Conclusion </title>
      <p>This paper researches the proposed network node characteristics – the network relaxation time and the
individual node relaxation time. The approbation of the presented characteristics of the relaxation time
and the individual relaxation time was carried out on the example of clustering of random networks
with clearly expressed clusters. It is shown, that these characteristics are unique numerical characteristic
of network nodes, and they can be used to find the centroids of clusters and combine nodes into groups
according to these characteristics, in other words, it can be used for complex networks clustering.</p>
      <p>The proposed and researched in this work numerical network and node characteristics can be used
during research and analysis of the network structure, making it possible to identify the most important
structural elements. Also, results of the research can be used when building personal search interfaces
for users of information and search systems. In turn, it will simplify the process of finding the necessary
information.</p>
      <p>The given algorithm, like the well-known LSA algorithm, is a cluster analysis algorithm that uses a
matrix representation of data. The complexity of the algorithm is determined by the complexity of the
PageRank, HITS or any other iterative algorithm, which is used to recalculate node weights.</p>
      <p>The novelty of the algorithm is defined by the approach for calculating the weight of nodes (the
values of relaxation time of network or relaxation time of nodes), the most significant of which can be
used as centres for determining clusters (centroids). If it is necessary to improve the quality of the
proposed approach, certain centroids can be passed as input to other well-known algorithms such as
Kmeans.
8. References </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Barabâsi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Jeong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Néda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Ravasz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Schubert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Vicsek</surname>
          </string-name>
          ,
          <article-title>"Evolution of the social network of scientific collaborations." Physica A: Statistical mechanics</article-title>
          and
          <source>its applications 311</source>
          .3-
          <fpage>4</fpage>
          (
          <year>2002</year>
          ):
          <fpage>590</fpage>
          -
          <lpage>614</lpage>
          . doi:
          <volume>10</volume>
          .1016/S0378-
          <volume>4371</volume>
          (
          <issue>02</issue>
          )
          <fpage>00736</fpage>
          -
          <lpage>7</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M. E. J.</given-names>
            <surname>Newman</surname>
          </string-name>
          ,
          <article-title>"The structure and function of complex networks</article-title>
          .
          <source>" SIAM review 45.2</source>
          (
          <year>2003</year>
          ):
          <fpage>167</fpage>
          -
          <lpage>256</lpage>
          . doi:
          <volume>10</volume>
          .1137/S003614450342480
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Strogatz</surname>
          </string-name>
          :
          <article-title>"Exploring complex networks</article-title>
          .
          <source>" nature 410</source>
          .6825 (
          <year>2001</year>
          ):
          <fpage>268</fpage>
          -
          <lpage>276</lpage>
          . doi:
          <volume>10</volume>
          .1038/35065725
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Snarskii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Lande</surname>
          </string-name>
          ,
          <article-title>Modeling of complex networks: tutorial, K.:</article-title>
          <string-name>
            <surname>Engineering</surname>
          </string-name>
          ,
          <year>2015</year>
          .
          <source>ISBN 978-966-2344-44-8</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Havlin</surname>
          </string-name>
          ,
          <article-title>Complex networks: structure, robustness</article-title>
          and function. Cambridge university press,
          <year>2010</year>
          . doi:
          <volume>10</volume>
          .1017/CBO9780511780356
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Boccaletti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Latora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Moreno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Chavez</surname>
          </string-name>
          , D. U. Hwang,
          <article-title>Complex networks: Structure and dynamics</article-title>
          ,
          <source>Physics reports 424</source>
          .4-
          <fpage>5</fpage>
          (
          <year>2006</year>
          ):
          <fpage>175</fpage>
          -
          <lpage>308</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.physrep.
          <year>2005</year>
          .
          <volume>10</volume>
          .009
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Albert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Barabási</surname>
          </string-name>
          ,
          <article-title>"Statistical mechanics of complex networks</article-title>
          .
          <source>" Reviews of modern physics 74.1</source>
          (
          <year>2002</year>
          ):
          <fpage>47</fpage>
          . doi:
          <volume>10</volume>
          .1103/RevModPhys.74.47
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T.</given-names>
            <surname>Murata</surname>
          </string-name>
          (Ed.),
          <article-title>Handbook of social network technologies and applications</article-title>
          . Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2010</year>
          . doi:
          <volume>10</volume>
          .1007/978-1-
          <fpage>4419</fpage>
          -7142-5_
          <fpage>12</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Lancichinetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Fortunato</surname>
          </string-name>
          ,
          <article-title>"Community detection algorithms: a comparative analysis</article-title>
          .
          <source>" Physical review E 80.5</source>
          (
          <year>2009</year>
          ):
          <fpage>056117</fpage>
          . doi: 0.1103/PhysRevE.80.056117
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Estivill-Castro</surname>
          </string-name>
          ,
          <article-title>"Why so many clustering algorithms: a position paper." ACM SIGKDD explorations newsletter 4.1 (</article-title>
          <year>2002</year>
          ):
          <fpage>65</fpage>
          -
          <lpage>75</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>White</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Smyth</surname>
          </string-name>
          ,
          <article-title>A spectral clustering approach to finding communities in graphs</article-title>
          ,
          <source>in: Proceedings of the 2005 SIAM international conference on data mining</source>
          ,
          <year>2005</year>
          , pp.
          <fpage>274</fpage>
          -
          <lpage>285</lpage>
          . doi:
          <volume>10</volume>
          .1137/1.9781611972757.25
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lande</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Snarskii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Dmytrenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Subach</surname>
          </string-name>
          ,
          <article-title>Relaxation time in complex network</article-title>
          ,
          <source>in: Proceedings of the 15th International Conference on Availability, Reliability and Security</source>
          , ARES '
          <volume>20</volume>
          ,
          <issue>99</issue>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1145/3407023.3409231
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Lande</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. O.</given-names>
            <surname>Dmytrenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Snarskii</surname>
          </string-name>
          ,
          <article-title>"Research of network`s relaxation coefficient as characteristics of network`s nodes." Data Recording</article-title>
          ,
          <source>Storage &amp; Processing 21.1</source>
          (
          <year>2019</year>
          ):
          <fpage>83</fpage>
          -
          <lpage>94</lpage>
          . doi:
          <volume>10</volume>
          .35681/
          <fpage>1560</fpage>
          -
          <lpage>9189</lpage>
          .
          <year>2019</year>
          .
          <volume>1</volume>
          .1.
          <fpage>179714</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lande</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Subach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Puchkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Soboliev</surname>
          </string-name>
          ,
          <article-title>"A Clustering Method for Information Summarization and Modelling a Subject Domain."</article-title>
          <source>Information &amp; Security 50.1</source>
          (
          <year>2021</year>
          ):
          <fpage>79</fpage>
          -
          <lpage>86</lpage>
          . doi:
          <volume>10</volume>
          .11610/isij.5013
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Likas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Vlassis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Verbeek</surname>
          </string-name>
          ,
          <article-title>"The global k-means clustering algorithm</article-title>
          .
          <source>" Pattern recognition 36.2</source>
          (
          <year>2003</year>
          ):
          <fpage>451</fpage>
          -
          <lpage>461</lpage>
          . doi:
          <volume>10</volume>
          .1016/S0031-
          <volume>3203</volume>
          (
          <issue>02</issue>
          )
          <fpage>00060</fpage>
          -
          <lpage>2</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16] Gephi: makes graph handly,
          <year>2022</year>
          . URL: http://gephi.org
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>K.</given-names>
            <surname>Knox</surname>
          </string-name>
          ,
          <article-title>"Le Châtelier's Principle."</article-title>
          <source>Journal of Chemical Education</source>
          <volume>62</volume>
          .10 (
          <year>1985</year>
          ):
          <fpage>863</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.N.</given-names>
            <surname>Langville</surname>
          </string-name>
          , C.D. Meyer,
          <article-title>"Google's PageRank and beyond." Google's PageRank and Beyond</article-title>
          . Princeton university press,
          <year>2011</year>
          . doi:
          <volume>10</volume>
          .1515/9781400830329
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>J. M. Kleinberg</surname>
          </string-name>
          ,
          <article-title>"Authoritative sources in a hyperlinked environment</article-title>
          .
          <source>" Journal of the ACM (JACM) 46.5</source>
          (
          <year>1999</year>
          ):
          <fpage>604</fpage>
          -
          <lpage>632</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>