<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Robustness Study of Non-Uniform Scale-Free Hyper-Network Structure 1</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bin Zhou</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Xiujuan Ma</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fuxiang Ma</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>School of Computer, Qinghai Normal University</institution>
          ,
          <addr-line>Xining</addr-line>
          ,
          <country country="CN">China</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>The State Key Laboratory of Tibetan Intelligent Information Processing and Application</institution>
          ,
          <addr-line>Xining</addr-line>
          ,
          <country country="CN">China</country>
        </aff>
      </contrib-group>
      <fpage>94</fpage>
      <lpage>99</lpage>
      <abstract>
        <p>The relationship between the internal structure of the hyper-edge and robustness of the hypernetwork has not yet been investigated. Aiming at this problem, this paper proposes a hypernetwork capacity-load model with non-uniform load distribution. And obtained the robustness of the non-uniform scale-free hyper-network under different internal structures of the hyperedge. The simulation reveals that the robustness of the non-uniform scale-free hyper-network is closely related to the internal structure of the hyper-edge. The non-uniform scale-free hypernetwork is most robust when the nodes inside the hyper-edges are fully connected. The results show that the internal structure of hyper-edge has a large impact on the overall robustness of the non-uniform scale-free hyper-network.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;non-uniform scale-free hyper-network</kwd>
        <kwd>the capacity-load model</kwd>
        <kwd>hyper-network structure</kwd>
        <kwd>robustness</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        Nowadays, complex networks have become an effective tool for modeling all kinds of complex
systems [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. For many realistic complex systems, robustness is their most essential system performance.
In recent years, researchers have also successfully investigated the robustness of various complex
systems based on complex network theory [
        <xref ref-type="bibr" rid="ref2 ref3 ref4">2-4</xref>
        ]. However, with the development of the times, various
systems in production life are becoming more and more complex. The graph-based theory of complex
networks is no longer a good representation of complex system structures [
        <xref ref-type="bibr" rid="ref5 ref6">5,6</xref>
        ]. The emergence of
hyper-network theory has brought new research methods to study such complex systems. Hyper-edges in
a hyper-network can better represent some complex relationship between multiple nodes at the same
time. Therefore, hyper-networks have been used to model many real complex systems [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7-9</xref>
        ]. Although
the modeling research of hyper-network has become more and more mature, because of the complex
structure of hyper-network, the research on the robustness of hyper-network is still in its infancy. Ma
et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] found through research that the hyper-network is more robust to the same external disturbance
than the ordinary network. Chen et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] found that random hyper-network and small-world
hypernetwork are more robust than random networks and smallworld networks. And the robustness of
random hyper-network is stronger than small-world hyper-network. However, the above works do not
consider the relationship between the internal structure of the hyper-edge and the robustness of the
hyper-network. In real life, the influence of microstructure on macrostructure cannot be ignored. For
example, in integrated circuit development [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], studying the connection relationship between
electronic components inside the integrated functional block can further optimize the robustness of the
integrated circuit. Therefore, studying the relationship between the internal structure of the hyper-edge
and the robustness of the hyper-network can provide a more comprehensive knowledge and
understanding of the factors influencing the robustness of the hyper-network, and thus can propose better
optimization strategies to improve the resistance of the hyper-network to various types of attacks.
      </p>
      <p>
        In this paper, based on non-uniform scale-free hyper-networks [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], the internal structure of the
hyper-edges is considered, three non-uniform scale-free hyper-networks with different structures inside
the hyper-edges are constructed, and a capacity-load model applicable to the hyper-networks is
proposed based on the idea of the capacity-load model [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], and the relationship between the internal
structure of the hyper-edges and the robustness of the non-uniform scale-free hyper-networks is investigated.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2 Research Methodology</title>
    </sec>
    <sec id="sec-3">
      <title>2.1 The concept of hyper-graph</title>
      <p>
        The concept of hyper-graph, defined as follows. If the binary relation H=(V,E) satisfies the condition
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] :
1) Ø=ei∈P(V), i∈{1,2,⋯,m};
2) ⋃im=1 =V.
      </p>
      <p>
        where the elements in the set V are calledthe nodes or vertices of the hyper-graph, and the elements
in E are called the hyper-edges of the hyper-graph. P(V) denotes the power set of the set V; then H is a
hyper-graph. The hyper-graph of a node i in a hyper-graph is defined as the number of hyper-edges
containing the node i, denoted as dH(i) [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The node degree of node i is similar to that of a normal
network and isstill defined as the number of normal edges associated with node i, denoted as d(i) [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
The ordinary degree of node i within a separate hyper-edge ei is denoted as kei(i). The number of nodes
contained within a hyper-edge is denoted as the order of this hyper-edge, denoted as o(ei).
      </p>
    </sec>
    <sec id="sec-4">
      <title>2.2 Hyper-network capacity-load model</title>
      <p>
        Inspired by the capacity-load model proposed by Motter [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], we propose a cascade model under
the load local redistribution rule. In our model, the main differences from previous models are as follows.
      </p>
      <p>(1) In a hyper-network with N nodes, the initial load of node i is related to the hyper-degree dH(i)
and node degree d(i) of that node, and its initial load Li(0) is defined as</p>
      <p>Li (0) = α (dH (i) + d (i))β ,α ≥ 1,β ≥ 1</p>
      <p>In order to control the initial load of node i, let α be the load parameter and β be the adjustable
parameter.</p>
      <p>(2) The load on the failed node i will be distributed to node j in 2 steps.</p>
      <p>Step 1: First assign to its associated unfailed hyper-edges according to the priority probability.
where Εi denotes the set of all associated hyper-edges of the faulty node i.</p>
      <p>Step 2: After the faulty node i assigns the load to its adjacent unfailed hyper-edges according to the
above equation, it continues to assign according to the priority probability Πnode.</p>
      <p>where Γi denotes the set of all unfailed neighbor nodes of the faulty node i within the hyper-edge
ei.</p>
      <p>Then the load received by node j is shown in equation (4).</p>
      <p>From equation (4), it can be seen that the additional load received by node j within the hyper-edge
∏ hyper−edge =</p>
      <p>o(ei )
 o(em )
m∈Ei
∏node =</p>
      <p>kei (i)
r∈Γi kei (r)
ΔLji = Li × Πhyper−edge × Πnode
ei is related to the order of the hyper-edge it is on, the commonness of node j within the hyper-edge ei,
and the initial load of node i.</p>
      <p>In a realistic hyper-network, the capacity is the maximum value of the load that a node or
hyperedge can handle, proportional to the initial load of the node. Let the capacity of node j be, expressed by
equation (5).</p>
      <p>C j = (1+ T )Lj T ≥ 0
(5)</p>
      <p>Here T is the capacity parameter, the larger the value of T, the higher the capacity of the node and
the more resilient it is to failures, but the cost of resilience increases. The critical threshold TC is the
minimum capacity value to avoid global collapse of the hyper-network. When T&gt;TC, the entire
hypernetwork does not experience a global collapse. When T&lt;TC, the whole hyper-network will experience
a global collapse. Therefore, the critical threshold TC of T is an important indicator of the robustness of
the hyper-network. Obviously, a smaller TC indicates a more robust hyper-network.</p>
      <p>If node j fails after obtaining additional load, it should satisfy the following inequality.</p>
      <p>Lj + ΔLji &gt; C j</p>
      <p>If equation (6) holds, then node j will overload and fail, which may cause other nodes to fail when
node j 's load is redistributed.</p>
      <p>To measure the robustness of the hyper-network, node i is initially attacked and made to fail, and
then its load is redistributed. For other nodes after load redistribution, the node fails if equation (6) is
satisfied. When all nodes within a hyper-edge fail, then this hyper-edge fails. After the number of failed
nodes in the hyper-network reaches a steady state or all nodes fail (global collapse), the number of failed
hyper-edges FM (0 ≤ FM≤ M) in the hyper-network is counted and the percentage of hyper-edge failure
fM is calculated as shown in equation (7).</p>
      <p>F
fM = M , 0 ≤ fM ≤ 1</p>
      <p>M</p>
      <p>Where M is the total number of hyper-edges in the hyper-network. From equation (7), it can be seen
that a larger fM indicates a larger number of failed hyper-edges in the hyper-network, i.e., the less
robustness of the hyper-network.</p>
    </sec>
    <sec id="sec-5">
      <title>3 Simulation experiments</title>
      <p>In analyzing the relationship between the internal structure of non-uniform scale-free hyper-network
hyper-edge and the robustness of the hyper-network, this paper constructs three hyper-networks: the
non-uniform scale-free hyper-network with preferentially connected nodes inside the hyperedge is
denoted as NON-BA-P hypernetwork; the non-uniform scale-free hyper-network with stochastically
connected nodes inside the hyperedge is denoted as NON-BA-S hypernet-work; the non-uniform scale-free
hyper-network with fully connected nodes inside the hyperedge is denoted as NON-BA-F hypernetwork.
And simulates the cascading failure process of the non-uniform scale-free hyper-network with different
structures inside the three hyper-edges under two strategies of deliberate attack and random attack
simulations, and the related experimental data are recorded. The random attack in the simulation experiment
is to randomly select a node in the hyper-network to attack; while the deliberate attack is to select the
node in the hyper-network that satisfies the maximum sum of node degree value and node hyperdegree
to attack.</p>
      <p>The size of each type of hyper-network is related to the parameter max-node, so in order to perform
simulation analysis at different sizes, three sizes of networks with max-node of 20, 40 and 60 are used
in this paper. The focus of this paper is to discover the influence of the internal structure of the
hyperedge on the robustness of the hyper-network, and to eliminate the influence of other uncertainties on
the robustness, we use the control variable method, i.e., the parameter α is taken as 10 and the parameter
β is taken as 1. To ensure the validity and authenticity of the results, the experimental results are taken
as the average of 100 times results.
0.8
0.7
0.6
fM0.5
0.4
0.3
0.2
0.1
0.9
0.8
0.7
0.6
fM0.5
0.4
0.3
0.2
0.1</p>
    </sec>
    <sec id="sec-6">
      <title>3.1 Robustness of the NON-BA-P hyper-network</title>
    </sec>
    <sec id="sec-7">
      <title>3.2 Robustness of the NON-BA-S hyper-network</title>
      <p>0.8
0.7</p>
    </sec>
    <sec id="sec-8">
      <title>3.3 NON-BA-F Hyper-Network Robustness</title>
      <p>Figs.3(a) and (b) further verify that the critical threshold TC of the NON-BA-F hyper-network is
0.8
0.7</p>
    </sec>
    <sec id="sec-9">
      <title>3.4 Comparative analysis of three non-uniform scale-free hyper-networks</title>
      <p>We found through simulation experiments that the three non-uniform scale-free hyper-networks
show a decreasing trend of hyper-edge failure ratio with the increase of capacity parameter value under
two strategies of deliberate attack and random attack, and reach the critical threshold of global collapse
under a certain capacity parameter. When T≤TC, all three non-uniform scale-free hyper-networks are in
the state of global collapse, and when T&gt;TC, the failure scale starts to decrease and finally reaches the
state of global non-failure. In order to observe the change of the critical threshold more conveniently
and intuitively, we give the data tables of the three non-uniform scale-free hyper-networks when the
maximum number of nodes within the hyper-edge is 20,40,60, respectively, as shown in Table 1.</p>
      <p>We find that different structures inside the hyper-edge have different effects on the robustness of the
hyper-network. When the internal structure of the hyper-edge is fully connected, the non-uniform
scalefree hyper-network is the most robust; followed by when the internal structure of the hyper-edge is
randomly connected, the non-uniform scale-free hyper-network robustness is at a medium level; when
the internal structure of the hyper-edge is preferentially connected, the non-uniform scale-free
hypernetwork robustness is the worst.</p>
    </sec>
    <sec id="sec-10">
      <title>4 Conclusion</title>
      <p>In order to break through the limitations of the existing research on the structural robustness of
hyper-networks and explore the relationship between the internal structure of hyper-edges and the
robustness of hyper-networks, we propose three hyper-edges with different internal structure of non-uniform
scale-free hyper-networks models, and propose a non-uniformly distributed capacity-load model of
hyper-networks, and analyze the influence of the internal structure of hyper-edges on the overall
robustness of non-uniform scale-free hyper-networks. The following conclusions are obtained: the internal
structure of the hyper-edge has an important influence on the robustness of the non-uniform scale-free
hyper-network, and the robustness of the non-uniform scale-free hyper-network is strongest when the
internal structure of the hyper-edge is fully connected; the robustness of the non-uniform scale-free
hyper-network is worst when the internal structure of the hyper-edge is preferentially connected. And
when the maximum size number max-node of nodes inside the hyper-edge is larger, the robustness of
the non-uniform scale-free hyper-network is stronger.</p>
    </sec>
    <sec id="sec-11">
      <title>5 Acknowledgments</title>
      <p>This work is supported by Natural Science Foundation of Qinghai Province in China (NO.
2019-ZJ7012) and the National Natural Science Foundation of China (NOS. 11801296, 61603206).
6 References</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Santos</surname>
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aquino</surname>
            <given-names>A. L. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Madeira</surname>
            <given-names>E. R. M.</given-names>
          </string-name>
          , et al:
          <article-title>Temporal complex networks modeling applied to vehicular ad-hoc networks</article-title>
          ,
          <source>Journal of Network and Computer Applications</source>
          . Vol.
          <volume>192</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>103168</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Wang</surname>
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            <given-names>J. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kang</surname>
            <given-names>D.</given-names>
          </string-name>
          , et al:
          <article-title>Review on strategies enhancing the robustness of complex network</article-title>
          ,
          <source>Complex Systems and Complexity Science</source>
          . Vol.
          <volume>17</volume>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>26</lpage>
          +
          <fpage>46</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Wang</surname>
            <given-names>S. L.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>LYU W. Z.</given-names>
            ,
            <surname>Zhang</surname>
          </string-name>
          <string-name>
            <surname>J. H.</surname>
          </string-name>
          , et al:
          <article-title>Method of power network critical nodes identification and robustness enhancement based on a cooperative framework, Reliability Engineering &amp; System Safety</article-title>
          . Vol.
          <volume>207</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>107313</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Gao</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buldyrev</surname>
            <given-names>S. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Havlin</surname>
            <given-names>S.</given-names>
          </string-name>
          , et al:
          <article-title>Robustness of a network formed by n interdependent networks with a one-to-one correspondence of dependent nodes, Physical Review E</article-title>
          . Vol.
          <volume>85</volume>
          ,
          <year>2012</year>
          , pp.
          <fpage>066134</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Federico</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giulia</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iacopo</surname>
            <given-names>I.</given-names>
          </string-name>
          , et al:
          <article-title>Networks beyond pairwise interactions: Structure and dynamics</article-title>
          ,
          <source>Physics Reports</source>
          . Vol.
          <volume>874</volume>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>92</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Sinan</surname>
            <given-names>G. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cliff</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carlos</surname>
            <given-names>O. M.</given-names>
          </string-name>
          , et al:
          <article-title>Hypernetwork science via high-order hypergraph walks, EPJ Data Science</article-title>
          . Vol.
          <volume>9</volume>
          ,
          <issue>2020</issue>
          , pp.
          <fpage>519</fpage>
          -
          <lpage>535</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Li</surname>
            <given-names>M. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guo</surname>
            <given-names>J. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bian</surname>
            <given-names>W.</given-names>
          </string-name>
          , et al:
          <article-title>Tang poetry from the perspective of network</article-title>
          ,
          <source>Complex Systems and Complexity Science</source>
          . Vol.
          <volume>14</volume>
          ,
          <year>2017</year>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>71</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Hu</surname>
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            <given-names>H. X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            <given-names>J. B.</given-names>
          </string-name>
          , et al:
          <article-title>An evolving model for hypergraph-structure-based scientific collaboration networks</article-title>
          ,
          <source>Acta Physica Sinica</source>
          . Vol.
          <volume>62</volume>
          ,
          <year>2013</year>
          , pp.
          <fpage>547</fpage>
          -
          <lpage>554</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Hu</surname>
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            <given-names>J</given-names>
          </string-name>
          ., et al:
          <article-title>Analysis and application of the topological properties of protein complex hypernetworks</article-title>
          ,
          <source>Complex Systems and Complexity Science</source>
          . Vol.
          <volume>15</volume>
          ,
          <year>2018</year>
          , pp.
          <fpage>31</fpage>
          -
          <lpage>38</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Ma</surname>
            <given-names>X. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            <given-names>H. X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hu</surname>
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Cascading failure analysis in hyper-network based on the hypergraph</article-title>
          ,
          <source>Acta Physica Sinica</source>
          . Vol.
          <volume>65</volume>
          ,
          <year>2016</year>
          , pp.
          <fpage>374</fpage>
          -
          <lpage>383</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Chen</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ma</surname>
            <given-names>X. J.</given-names>
          </string-name>
          , Ma F.
          <string-name>
            <surname>X.</surname>
          </string-name>
          , et al:
          <article-title>The Capacity Load Model of K-Uniform Hyper-Network based on Equal Load Distribution</article-title>
          ,
          <source>Journal of Physics: Conference Series</source>
          . Vol.
          <year>1828</year>
          ,
          <year>2021</year>
          , pp.
          <fpage>012060</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Jiang</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            <given-names>H.</given-names>
          </string-name>
          , et al:
          <article-title>Secure Data Transmission and Trustworthiness Judgement Approaches Against Cyber-Physical Attacks in an Integrated Data-Driven Framework</article-title>
          ,
          <source>IEEE Transactions on Systems, Man, and Cybernetics: Systems</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Chen</surname>
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Research on the cascading failures model and application of hypernetwork based on capacity-load</article-title>
          . Qinghai Normal University,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Motter</surname>
            <given-names>A. E.</given-names>
          </string-name>
          , Cheng L. Y.:
          <article-title>Cascade-based attacks on complex networks, Physical Review E</article-title>
          . Vol.
          <volume>66</volume>
          ,
          <year>2002</year>
          , pp.
          <fpage>065102</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Berge</surname>
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Graphs and Hpergraphs</article-title>
          . New York: Elsevier,
          <year>1973</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Bretto</surname>
            <given-names>A.</given-names>
          </string-name>
          :
          <source>Hypergraph Theory</source>
          . Springer, Heidelberg,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>