Skip to main content
NIHPA Author Manuscripts logoLink to NIHPA Author Manuscripts
. Author manuscript; available in PMC: 2021 Mar 3.
Published in final edited form as: Adv Appl Math. 2020 Dec 9;124:102145. doi: 10.1016/j.aam.2020.102145

Horizontal visibility graph of a random restricted growth sequence

Toufik Mansour *, Reza Rastegar , Alexander Roitershtein
PMCID: PMC7929487  NIHMSID: NIHMS1673391  PMID: 33664536

Abstract

We study the distributional properties of horizontal visibility graphs associated with random restrictive growth sequences and random set partitions of size n. Our main results are formulas expressing the expected degree of graph nodes in terms of simple explicit functions of a finite collection of Stirling and Bernoulli numbers.

Keywords: restricted growth function, partitions of a set, horizontal visibility graph

1. Introduction and statement of results

We study here horizontal visibility graphs of restricted growth sequences. The latter class of sequences is of interest both independently and in connection with set partitions [19], q-analogues [2], certain combinatorial matrices [7], bargraphs [20], and Gray codes [5].

A horizontal visibility graph (HVG) [17] constitutes a paradigmatic complex network representation of sequential data, typically used to reveal order structures within the data set [8, 35]. HVG-based algorithms have been employed to characterize fractal behavior of dynamical systems [21, 31], study canonical routes to chaos (see [24] and references therein), discriminate between chaotic and stochastic time series [26], and test time series irreversibility [33]. There is a growing body of literature using these combinatorial data analysis techniques in applied fields such as optics [1], fluid dynamics [22], geophysics [30], physiology and neuroscience [18, 27], finance [25], image processing [13], and more [8, 35]. For other graph theoretic methods of applied time series analysis as well as many fruitful extensions of the horizontal visibility algorithm, we refer to recent surveys [8, 35].

From a combinatoric point of view, HVGs are outerplanar graphs with a Hamiltonian path, an important subclass of so-called non-crossing graphs of algebraic combinatorics [10]. An illuminating characterization of HVGs using “one-point compactified” times series and tools of algebraic topology is obtained in a recent work [29]. Theoretical body of work on the HVGs includes studies of their degree distributions [14, 16], information-theoretic [9, 15] and other [11] topological characteristics, motifs [12, 32], spectral properties [6, 17], and dependence of graph features on the parameter for a specific parametric family of chaotic [4] or stochastic processes [31, 34]. For more, see a recent comprehensive survey [35] and an extensive review of earlier results [23].

In this paper, our main focus is on the degree properties of the horizontal visibility graph associated with a random restricted growth sequence. Let π = π1πn be a sequence of elements of a totally ordered set. We say that (πi, πj) is a strong visible pair if

maxi<l<jπl<min{πi,πj},

where we use the usual convention that max ∅ = −∞. Similarly, we refer to (πi, πj) as a weak visible pair if

maxi<l<jπlmin{πi,πj}.

We denote by Vπ the set of all strong visible pairs of π, and let Vπ=Card(Vπ) be the number of strong visible pairs in the sequence π. For example,

V12122={(1,2),(2,3),(3,4),(4,5),(2,4)},V12122=5.

We use the above notation with addition of the superscript w to denote the corresponding weak visibility pairs statistics. For example,

V12122w={(1,2),(2,3),(3,4),(4,5),(2,4),(2,5)},V12122w=6.

The graph Gπ:=([n],Vπ) with the set of nodes [n] := {1, 2, … , n}is the horizontal visibility graph associated with π [17]. For i ∈ [n], we denote by dπ(i) the degree of the node i in the visibility graph Gπ. We set eπ(i, j) = 1 when eπ(i,j)Vπ and eπ(i, j) = 0 otherwise. Thus,

dπ(i)=j[n]\{i}eπ(i,j). (1)

We now turn to the definition of a restricted growth sequence. A sequence of positive integers π=π1π2πnn is called a restricted growth sequence if

π1=1andπj+11+max{π1,,πj}for all 1j<n.

There is a bijective connection between these sequences and canonical set partitions. A partition of a set A is a collection of non-empty, mutually disjoint subsets, called blocks, whose union is the set A. A partition II with k blocks is called a k-partition and denoted by II = A1|A2|⋯|Ak. A k-partition A1|A2||Ak is said to be in the standard form if the blocks Ai are labeled in such a way that

minA1<minA2<<minAk.

The partition can be represented equivalently by the canonical sequential form π1π2πn, where πi ∈ [n] and iAπi for all i [19]. In words, πi is the label of the partition block that contains i. It is easy to verify that a word π ∈ [k]n is a canonical representation of a k-partition of [n] in the standard form if and only if it is a restricted growth sequence [19].

Example 1.1.

For instance, canonical partition {1, 4, 7} | {2, 3, 6, 9} | {5, 8} in the canonical sequential form is π = 122132132, where π3 = 2 indicates that 3 belongs to the second block {2, 3, 6, 9}, etc. The (weak and strong) visibility graphs of π are given in Fig. 1 below.

Figure 1:

Figure 1:

On he left is a picture of the strong visibility graph of the sequence 12132132231. On the right, is the weak visibility graph associated with same sequence.

We denote by Rn the set of all restricted growth sequences of length n. For a given πRn, we let O(π):=Card{πi:i[n]}, the number of different letters in the word π. For example, O(1231)=3. We denote by Rn,k the set of all restricted growth sequences π with O(π)=k. Clearly, Rn:=k[n]Rn,k.

It is well-known that Card(Rn,k)=Sn,k and Card(Rn)=Bn where Sn,k is a Stirling number of second kind and Bn is the n-th Bell number [19]. The Stirling numbers can be introduced algebraically in several different ways. For instance,

xkj=1k(1jx)=n0Sn,kxn,k. (2)

Alternatively, one can define the sequence of Stirling numbers of the second kind as the solution to the recursion

Sn,k=kSn1,k+Sn1,k1,n,k,kn, (3)

with S0,0 = 1 and S0,n = 0. The sequence of Bell numbers (Bn)n≥0 can be then defined for instance, through the formula Bn=k=0nSn,k, or, recursively via the formula Bn+1=k=0n(nk)Bk with B0 = 1, or through Dobinski’s formula [3]

Bn=1em=0mnm!,n0. (4)

In what follows, we denote a random restricted growth sequence, sampled uniformly from Rn,k(resp.Rn) by π(n) (resp. π(n,k)). That is,

P(π(n,k)=π)=1Sn,kfor allπRn,k,

and

P(π(n)=π)=1Bnfor allπRn.

We denote by Gn,k:=Gπ(n,k)(resp.Gn:=Gπ(n)) the HVG of the random restrictive growth sequence π(n,k) (resp. π(n)). Furthermore, we use the notations en(., .), dn(.), and Vn to denote, respectively, eπ(n)(.,.), dπ(n)(.), and Vπ(n). See Fig. 2 below for two instances of visibility graphs of uniformly sampled restrictive growth sequences of length n = 200.

Figure 2:

Figure 2:

An instance of G200 (on the left) and the corresponding G200w (on the right).

For any k, we define the generating function

Pk(x,q):=n=kxnSn,kE(qVππRn,k)=n=kπRn,kxnqVπ,x,q. (5)

Knowing an explicit form of (5), would in principle give us the distribution of Vn in full details for all n. Unfortunately, so far we were unable to find an explicit form of Pk(x, q). In this paper, we calculate instead the following generating function:

Q_(x,y):=k1ykn0xnn!BnE(VππRn,k).

Theorem 1.2.

We have:

Q_(x,y)=1y0xeyextt0teyexr+r(erx+y)T_(r,yexr)drdt,

where

T_(x,y)=y30x(xt)eyety0tEi(1,yer)eyer+2rdrdt+y0x(tx)eyety(Ei(1,yet)eyet(yet1)yet)dt+y(1y)0x(tx)eyetEi(1,yet)dt,

and Ei(1,z)=1ezttdt is the exponential integral.

Example 1.3.

First several terms of the generating function Q(x, 1) are given by

x2+53x3+4724x4+11360x5+1912x6+1013840x7+1142913440x8+204361362880x9+

The proof of Theorem 1.2 is given in Section 2. The solution is derived from a PDE for T which is obtained in Lemma 2.6. Our next result, Theorem 1.4, gives a an alternative, closed form expression for E(Vn) through a different, probabilistic approach.

We partition In = {(i, j) : 1 ≤ i < jn} into three subsets

In(1):={(1,j):3jn},In(2):={(i,i+1):1in1},In(3):={(i,j):2i<jn,j>i+1}.

Clearly, eπ (i, j) = 0 on In(1) and eπ (i, j) = 1 on In(2) for all πRn. Therefore,

Vπ=n1+(i,j)In(3)eπ(i,j). (6)

The following theorem evaluates the probability that (i,j)Vn for a given (i,j)In(3) in terms of explicit multi-linear polynomials of Sk,i, Bi, and Bernoulli numbers. By virtue of (1), the result immediately yields the average degree E(dn(i)) of any given node iVn and the average number of edges E(Vn).

We will use the following Bernoulli formula for Faulhaber polynomials [3]:

Ψn(t):=k=0tkn1=1nl=0n1(nl)tnlBl,n,t0. (7)

where Bl are Bernoulli numbers. The latter can be calculated, for example, using the recursion

l=0n1(nl)Bl=0

with B0=1. See, for instance, [3] for alternative definitions of Bernoulli numbers.

We will also need the following well-known extension of Dobinski’s identity (4). For any integers n, t ≥ 0 we have:

Θn(t):=1em=tmn(mt)!=1ek=0(k+t)nk!=1el=0n(nl)tnlk=0klk!=l=0n(nl)tnlBl, (8)

were in the last step we applied the original formula (4).

Theorem 1.4.

For all n ≥ 3 and (i,j)In(3), we have

BnP((i,j)Vn)=t=1i1Si1,tΘnj+1(t)Ψji(t1)+t=1i1Si1,tΘnj(t)a=1t{a(a1)ji1+Ψji(a1)}+t=1i1Si1,tΘnj+1(t+1)tji1+t=1i1Si1,tΘnj(t+1){(t+1)tji1+Ψji(t)}.

The proof of Theorem 1.4 is deferred to Section 3. We next evaluate the probability that for a given pair of nodes i, j ∈ [n], we have (i,j)Vnw but (i,j)Vn.

Theorem 1.5.

The following holds true for n ≥ 3:

  1. If (i,j)In(3), then
    BnP((i,j)Vnw\Vn)=t=1i1Si1,tΘnj(t){tji+tji1+2Ψji(t1)}+t=1i1Si1,tΘji+1(t)tji1t=1i1Si1,tΘji(t+1){(t1)tji1+t(t+1)ji1}+t=1i1Si1,tΘji+1(t+1){(t+1)ji1tji1}.
  2. If (i,j)In(1), then
    P((i,j)Vnw\Vn)=Bnj+i+1Bn.

Since VnVnw, we have

E(Vnw)=E(Vn)+(i,j)In(1)P((i,j)Vnw\Vn)+(i,j)In(3)P((i,j)Vnw\Vn),

which yields E(Vnw). The proof of Theorem 1.5 is included in Section 4.

2. Proof of Theorem 1.2

Throughout this section, for any given ordinary generating function A(x)=n0anxn, x, we use A to denote the corresponding exponential generating function. That is,

A_(x):=n=0anxnn!=n=0xnn![xn]A(x),

where [xn]A(x) stands for the coefficient of xn in the generating function A(x).

Note that each restricted growth sequence in Rn,k can be represented as a word in the form 1π(1)2π(2)(k), where π(j) is an arbitrary subword over the alphabet [j]. Therefore, we can rewrite (5) as

Pk(x,q)=xkLk(x,q)j=1k1Mj(x,q), (9)

where Lk(x, q) and Mk(x, q) are given by

Lk(x,q)=n0π[k]nxnqV(kπ),Mk(x,q)=n0π[k]nxnqV(kπ(k+1)). (10)

This representation is instrumental in our proof of the following result:

Proposition 2.1.

For k ≥ 1,

Pk(x,q)=xk1xM˜k(x,q)j=1k1M˜j(x,q)(1xM˜j(x,q))2,

where M˜k(x,q) is defined recursively by the equation

M˜k(x,q)=M˜k1(x,q)+xq(M˜k1(x,q))21xM˜k1(x,q)

with the initial condition M˜1(x,q)=q.

Proof of Proposition 2.1.

In view of (9) and (10), in order to prove the proposition it suffices to evaluate Lk(x, q) and Mk(x, q). These calculations are the content of the next two lemmas.

Lemma 2.2.

For all k ≥ 1,

Lk(x,q)=j=1k11xM˜j(x,q),

where M˜k(x,q) satisfies the recurrence relation

M˜k(x,q)=M˜k1(x,q)+xq(M˜k1(x,q))21xM˜k1(x,q),

with M˜1(x,q)=q.

Proof of Lemma 2.2.

Any word ∈ [k]n can be written as

kπ=kπ(1)kπ(2)kπ(s)

for some s ≥ 1 and subwords π(j) ∈ [k − 1]. Thus, the contribution for a fixed s is (xM˜k(x,q))s1L˜k(x,q), where

L˜k(x,q)=n0π[k1]nxnqV(kπ),M˜k(x,q)=n0π[k1]nxnqV(kπk).

Hence,

Lk(x,q)=s1(xM˜k(x,q))s1L˜k(x,q)=L˜k(x,q)1xM˜k(x,q). (11)

Note that any word π ∈ [k − 1]n can be written as π(0)(k − 1)π(1) ⋯ (k − 1)π(s) with s ≥ 0 and π(j) is a word over alphabet [k − 2] for all j. Thus,

L˜k(x,q)=s1(xM˜k1(x,q))s1L˜k1(x,q)=L˜k1(x,q)1xM˜k1(x,q), (12)

where we used the fact that V (k) = V ((k − 1)π′ (k − 1)) for all π′ [k − 2]n. Hence, by (11) and (12), we see that L˜k(x,q)=Lk1(x,q), which leads to

Lk(x,q)=Lk1(x,q)1xM˜k(x,q).

By induction on k, and using the fact that L1(x,q)=11xq, we complete the proof for the formula Lk(x, q).

Now let us write an equation for M˜k(x,q). Clearly, M˜1(x,q)=q, which counts the only empty word according the the visible pairs in 11. Note that for any word π ∈ [k − 1]n, the word kπk can be decomposed as (0)(k − 1)π(1) ⋯ (k − 1)π(s)k with π(j) is a word over alphabet [k − 2] for all j. Thus,

M˜k(x,q)=M˜k1(x,q)+s1xsq(M˜k(x,q))s+1=M˜k1(x,q)+xq(M˜k1(x,q))21xM˜k1(x,q).

where we used that fact V (′(k − 1)) = V ((k − 1)π′(k − 1)) for all π′ ∈ [k − 2]n. □

Lemma 2.3.

For all k ≥ 1,

Mk(x,q)=M˜k(x,q)1xM˜k(x,q).

Proof of Lemma 2.3.

For any word ∈ [k]n, the word (k + 1) can be decomposed as either ′(k + 1) or ″(k + 1), where π′ is a word over alphabet [k − 1] and π″ is a word over alphabet [k]. Since V (′(k + 1)) = V (k), we have

Mk(x,q)=M˜k(x,q)+xM˜k(x,q)Mk(x,q),

which, by solving for Mk(x, q), complete the proof of Lemma 2.3. □

By Lemmas 2.2 and 2.3 and (9), we have

Pk(x,q)=xkj=1k111xM˜j(x,q)j=1k1M˜j(x,q)1xM˜j(x,q).

The proof of Proposition 2.1 is complete. □

Example 2.4.

The first coe cients of the generating function 1+k1Pk(x,q) are given by 1 + x + 2qx2 + 5q2x3 + (2q4 + 13q3)x4 + (18q5 + 34q4)x5 + (11q7 + 103q6 + 89q5)x6 + (6q9 + 160q8 + 478q7 + 233q6)x7 + (2q11 + 206q10 + 1359q9 + 1963q8 + 610q7)x8 + (230q12 + 3066q11 + 8813q10 + 7441q9 + 1597q8)x9.

With Proposition 2.1 at hand, we turn now to the study of the expected number of vertexes in Gn. More precisely, we obtain:

Proposition 2.5.

For all k ≥ 1,

qPk(x,q)|q=1=xkj=1k(1jx)Hk(x),

where

Hk(x)=i=1k1fi(x)(1ix)+2xi=1k1fi(x)+xfk(x),

with

fi(x):=1+xj=1i11jx1(j1)x(1(i1)x)(1ix).

We use here the usual convention that an empty sum is zero.

Proof of Proposition 2.5.

By Proposition 2.1, the generating function M˜k(x,q) satisfies

M˜k(x,q)=M˜k1(x,q)+xq(M˜k1(x,q))21xM˜k1(x,q)

with M˜1(x,q)=q. Thus,

M˜k(x,1)=M˜k1(x,1)1xM˜k1(x,1)

with M˜1(x,1)=1. Hence, by induction on k, we have M˜k(x,1)=11(k1)x.

Moreover, by differentiation the recurrence relation at q = 1, we obtain

qM˜k(x,q)|q=1=qM˜k1(x,q)|q=1+x(M˜k1(x,1))2+xM˜k1(x,1)q M˜k1(x,q)|q=1(2xM˜k1(x,1))(1xM˜k1(x,1))2,

which, by M˜k(x,1)=11(k1)x, implies

q M˜k(x,q)|q=1=x(1kx)2+(1(k1)x)2(1kx)2q M˜k1(x,q)|q=1.

We can now complete the proof of the proposition by using induction on k and the initial condition qM˜1(x,q)|q=1=1. □

By Proposition 2.5, we have:

qPk(x,q)|q=1x1kxqPk1(x,q)|q=1=xkj=1k(1jx)(1+xj=1k11jx1(j1)x1(k1)x+x+x2j=1k11jx1(j1)x(1(k1)x)(1kx))

with qP1(x,q)|q=1=x21x. For all k ≥ 2, define

Tk(x)=xkj=1k(1jx)1+xj=1k21jx1(j1)x1(k1)x.

Then,

(1kx)qPk(x,q)|q=1xqPk1(x,q)|q=1=Tk(x)+Tk+1(x)1(k1)x (13)

with qP1(x,q)|q=1=x2(1x)2.

In order to solve (13), we first study the corresponding exponential generating functions Qk(x) and Tk(x) of the ordinary generating functions Qk(x)=qPk(x,q)|q=1 and Tk(x), respectively. In other words,

Q_k(x)=n0xnn![xn]qPk(x,q)|q=1

and

T_k(x)=n0xnn![xn]Tk(x),T_(x,y)=k2T_k(x)yk.

Lemma 2.6.

The generating function T_(x,y)=k2T_k(x)yk is given by

T_(x,y)=y30x(xt)eyety0tEi(1,yer)eyer+2rdrdt+y0x(tx)eyety(Ei(1,yet)eyet(yet1)yet)dt+y(1y)0x(tx)eyetEi(1,yet)dt,

where Ei(1,z)=1ezttdt.

Proof of Lemma 2.6.

By the definition of Tk(x), we have:

(1(k3)x)(1(k1)x)Tk(x)x(1(k3)xTk1(x)=xk+1j=1k3(1jx)

with L2(x)=x21x. Rewriting this equation in terms of exponential generating functions, we obtain:

d4dx4T_k(x)(2k4)d3dx3T_k(x)+(k3)(k1)d2dx2T_k(x)d3dx3T_k1(x)+(k3)d2dx2T_k1(x)=(ex1)k3(k3)!,

where we used (2) and the fact that nkSn,kxnn!=(ex1)kk!.

Multiplying both sides of the last recurrence by yk and summing over k ≥3, we obtain:

4x4(T_(x,y)T_2(x)y2)2y4x3y(T_(x,y)T_2(x)y2)+43x3(T_(x,y)T_2(x)y2)+yy(y3x2y(T_(x,y)T_2(x)y2))4y3x2y(T_(x,y)T_2(x)y2)+32x2(T_(x,y)T_2(x)y2)y3x3T_(x,y)+y3x2y(yT_(x,y))3y2x2T_(x,y)=y3ey(ex1),

where T2(x) = ex − 1 − x. Note that

T_(0,y)=xT_(x,y)|x=0=0,2x2T_(x,y)|x=0=y2,3x3T_(x,y)|x=0=y2+y3.

Solving the partial differential equation with these initial conditions, we obtain the result in Lemma 2.6. □

Finally,

d2dx2Q_k(x)(2k1)ddxQ_k(x)+k(k1)Q_k(x)ddxQ_k1(x)+(k1)Q_k1(x)=d2dx2(T_k(x)+T_k+1(x))

with Q1(x) = 1 + (x − 1)ex.

Recall Q_(x,y)=k1Q_k(x)yk. Multiplying both sides of this recurrence equation by yk and summing over k ≥ 2, we obtain

2x2(Q_(x,y)Q_1(x)y)2y2xy(Q_(x,y)Q_1(x)y)+x(Q_(x,y)Q_1(x)y)+yy(yy(Q_(x,y)Q_1(x)y))yy(Q_(x,y)Q_1(x)y)yxQ_(x,y)+yy(yQ_(x,y))yQ_(x,y)=2x2(T_(x,y)+1/y(T_(x,y)T_2(x)y2))

with Q(0, y) = 0 and xQ_(x,y)|x=0=0 This along with Lemma 2.6 and an aid of Maple, yields the explicit formula for the generating function Q(x, y) stated in Theorem 1.2. □

3. Proof of Theorem 1.4

The proof relies on the use of a generator of a uniformly random set partition of [n] proposed by Stam [28]. We next describe Stam’s algorithm for a given n.

  1. For m, let μn(m)=mnem!Bn. Dobinski’s formula (4) shows that μn(·) is a probability distribution on .

    At time zero, choose a random M distributed according to μn, and arrange M empty and unlabeled boxes.

  2. Arranges n balls labeled by integers from the set [n].

    At time i ∈ [n], place the ball ‘i’ into of one the M boxes, chosen uniformly at random. Repeat until there are no balls remaining.

  3. Label the boxes in the order that they get occupied by the balls. Once a box is labeled, the label does not change anymore.

  4. Form a set partition π of [n] with i in the k-th block if and only if ball ‘i” is in the k-th box.

Let Ni be the random number of nonempty boxes right after placing the i-th ball and Xi be the label of the box where the i-th ball was placed. Notice that if the i-th ball is dropped in an empty box, then Xi = Ni−1 + 1 and Ni = Ni−1 + 1. Otherwise, if the box was occupied previously, Xi = Xj where j < i is the first ball that was dropped in that box and Ni = Ni−1. Then, X := X1Xn is the random set partition of [n] produced by the algorithm.

We denote by Pm(·) conditional probability distribution P| M = m). Clearly N1 = 1, Nii, and

Pm(Ni+1=t+1Ni=t)=mtmandPm(Ni+1=tNi=t)=tm.

Let αi,t(m) := Pm(Ni = t). Then, taking in account that

Pm(Ni=t)=Pm(Ni=t,Ni1=t1)+Pm(Ni=t,Ni1=t),

we obtain:

αi,t(m)={tmαi1,t(m)+mt+1mαi1,t1(m) if 2tm and ti0 if t>i or t>m1mi1 if t=1 and 1i.

A comparison with (3) reveals that for tm,

Pm(Ni=t)=Si,tmim!(mt)!. (14)

In addition,

Pm(Xi+1=lNi=t)={1m if ltmtml=t+10 otherwise.

Notice that some of the boxes may remain empty at the end of the algorithm’s run.

In view of (6), in order to calculate E(Vn), we need to evaluate

E(en(i,j))=E[EM(en(i,j))]=E(PM(maxi<l<jXl<min{Xi,Xj}))

for (i,j)In(3). For any constant m we have:

Pm(maxi<l<jXl<min{Xi,Xj})=t=1(i1)mPm(maxi<l<jXl<min{Xi,Xj}|Ni1=t)Pm(Ni1=t)=t=1(i1)mk=1m(t+1)Pm(maxi<l<jXl<min{k,Xj}|Ni1=t,Xi=k)×Pm(Xi=ki|Ni1=t)Pm(Ni1=t)=m!mit=1(i1)mS(i1,t)(mt)!k=1tPm(maxi<l<jXl<min{k,Xj}|Ni1=t)+m!mit=1(i1)(m1)Pm(maxi<l<jXl<min{t+1,Xj}|Ni=t+1)S(i1,t)(mt1)!. (15)

Furthermore, for any at ≤ m we have:

Pm(maxi<l<jXl<min{a,Xj}|Ni=t)=b=1a1Pm(maxi<l<jXl<min{a,Xj},Xi+1=b|Ni=t)=b=1a1Pm(maxi<l<jXl<min{a,Xj}|Ni+1=t)Pm(Xi+1=b|Ni=t)=1mb=1a1Pm(maxi<l<jXl<min{a,Xj}|Ni+1=t).

Iterating, we obtain:

Pm(maxi<l<jXl<min{a,Xj}|Ni=t)=1mji1bi+1=1a1bj1=1a1Pm(maxi<l<jbl<Xj|Nj1=t). (16)

Denote p := maxi<ℓ<j b and q := |{ ∈ (i, j) : b = p}|. In this terms, the last summation can be written as

bi+1=1a1bj1=1a1Pm(maxi<l<jbl<Xj|Nj1=t)=p=1a1q=1ji1(ji1q)(p1)ji1qPm(Xj>p|Nj1=t)=p=1a1(pji1(p1)ji1)(1pm)=(1am)(a1)ji1+1mΨij(a1),

where Ψij is introduced in (7). Thus,

Pm(maxi<l<jXl<min{a,Xj}|Ni=t)=1mji((ma)(a1)ji1+Ψij(a1)). (17)

Inserting (14) and (17) into (15) and taking expectation with respect to μn(·), we obtain:

eBnP(en(i,j)=1)=t=1i1Si1,tΨij(t1)m=tmnj+1(mt)!+t=1i1Si1,ta=1t(a(a1)ji1+Ψij(a1))m=tmnj(mt)!+t=1i1Si1,ttji1m=t+1mnj+1(mt1)!+t=1i1Si1,t((t+1)tji1+Ψij(t))m=t+1mnj(mt1)!,

as desired. □

4. Proof of Theorem 1.5

Write:

P((i,j)Vnw\Vn)=E(PM(maxi<l<jXl=min{Xi,Xj})).

Case I) If (i,j)In(3), then similarly to the calculation in (15), for any m we have:

Pm(maxi<l<jXl=min{Xi,Xj})=m!mit=1(i1)mSi1,t(mt)!a=1tPm(maxi<l<jXl=min{a,Xj}|Ni=t)+m!mit=1(i1)(m1)Pm(maxi<l<jXl=min{t+1,Xj}|Ni=t+1)Si1,t(mt1)!. (18)

Similarly to (16), for atm we have:

Pm(maxi<l<jXl=min{a,Xj}|Ni=t)=Pm(maxi<l<jXl=a,Xja|Ni=t)+Pm(maxi<l<jXl=Xj,Xj<a|Ni=t). (19)

The first term on the right hand-side of (19) can be written as

Pm(maxi<l<jXl=a|Ni=t)Pn(aXj|Nj1=t)={Pm(maxi<l<jXla|Ni=t)Pm(maxi<l<jXla1|Ni=t)}ma+1m=1mji(ma+1)(aji1(a1)ji1). (20)

Similarly, the second term in right hand side of (19) contributes:

b=1a1Pm(maxi<l<jXl=b,Xj=b|Ni=t)=b=1a1Pm(maxi<l<jXl=b|Ni=t)Pm(Xj=b|Nj1=t)=1mb=1a1Pm(maxi<l<jXl=b|Ni=t)=1mb=1a1{(bm)ji1(b1m)ji1}=(a1)ji1mji. (21)

Inserting (20) and (21) back into (19), we obtain:

Pm(maxi<l<jXl=min{a,Xj}|Ni=t)=1mji((ma+1)aji1(ma)(a1)ji1).

Plugging the result into (18) and taking expectation with respect to μn(·) gives:

eBnP((i,j)Vnw\Vn)=m=1t=1(i1)mmnj(mt)!Si1,t(mtji1tji+tji1+2a=1t1aji1)+m=1t=1(i1)(m1)mnj(mt1)!Si1,t((mt)((t+1)ji1tji1)+tji1).

The result in case (i) follows from this formula by changing the order of summation and applying (8).

Case (ii) If (i,j)In(1), then

Pm(maxi<l<jXl=min{1,Xj})=1mji1.

Hence, an application of Dobinski’s identity (4) yields

P((i,j)Vnw\Vn)=1eBnm=1mnj+i+1m!=Bnj+i+1Bn,

as desired. □

Figure 3:

Figure 3:

Empirical distributions of V200 (left) and V200w (right) based on 1500 samples.

References

  • [1].Aragoneses A, Carpi L, Tarasov N, Churkin DV, Torrent MC, Masoller C, and Turitsyn SK, Unveiling temporal correlations characteristic of a phase transition in the output intensity of a fiber laser, Phys. Rev. Lett 116 (2016), 033902. [DOI] [PubMed] [Google Scholar]
  • [2].Cai Y and Readdy MA, q-Stirling numbers: a new view, Adv. in Appl. Math 86 (2017), 50–80. [Google Scholar]
  • [3].Comtet L, Advanced Combinatorics. The Art of Finite and Infinite Expansions, revised and enlarged edition, D. Reidel Publishing Co., 1974. [Google Scholar]
  • [4].Conejero JA, Lizama C, Mira-Iglesias A, and Rodero C, Visibility graphs of fractional Wu-Baleanu time series, Di erence Equ. Appl 25 (2019), 1321–1331. [Google Scholar]
  • [5].Conflitti A and Mamede R, Gray codes and lexicographical combinatorial generation for nonnesting and sparse nonnesting set partitions, Theoret. Comput. Sci 592 (2015), 87–96. [Google Scholar]
  • [6].Flanagan R, Lacasa L, and Nicosia V, On the spectral properties of Feigenbaum graphs, 2019, preprint is available at https://arxiv.org/abs/1903.00754.
  • [7].Galvin D and Pacurar A, Total non-negativity of some combinatorial matrices, 2019, preprint is available at https://arxiv.org/abs/1807.08658.
  • [8].Gao Z-K, Small M, and Kurths J, Complex network analysis of time series, Europhys. Lett. EPL 116 (2016), 50001. [Google Scholar]
  • [9].Gonçalves BA, Carpi L, Rosso OA, and Ravetti MG, Time series characterization via horizontal visibility graph and Information Theory, Phys. A 464 (2016), 93–102. [Google Scholar]
  • [10].Gutin G, Mansour T, and Severini S, A characterization of horizontal visibility graphs and combinatorics on words, Phys. A 390 (2011), 2421–2428. [Google Scholar]
  • [11].Hasson U, Iacovacci J, Davis B, Flanagan R, Tagliazucchi E, Laufs H, and Lacasa L, A combinatorial framework to quantify peak/pit asymmetries in complex dynamics, Sci. Rep 8 (2018), 3557. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [12].Iacovacci J and Lacasa L, Sequential visibility-graph motifs, Phys. Rev. E 93 (2016), 042309. [DOI] [PubMed] [Google Scholar]
  • [13].Iacovacci J and Lacasa L, Visibility graphs for image processing, to appear in IEEE Trans. Pattern Anal. Mach. Intell, 2019, https://ieeexplore.ieee.org/document/8606219. [DOI] [PubMed] [Google Scholar]
  • [14].Lacasa L, On the degree distribution of horizontal visibility graphs associated to Markov processes and dynamical systems: diagrammatic and variational approaches, Nonlinearity 27 (2014), 2063–2093. [Google Scholar]
  • [15].Lacasa L and Just W, Visibility graphs and symbolic dynamics, Phys. D 374/375 (2018), 35–44. [Google Scholar]
  • [16].Luque B and Lacasa L, Canonical horizontal visibility graphs are uniquely determined by their degree sequence, Eur. Phys. J. Sp. Top 226 (2017), 383–389. [Google Scholar]
  • [17].Luque B, Lacasa L, Ballesteros F, and Luque J, Horizontal visibility graphs: Exact results for random time series, Phys. Rev. E 80 (2009), 046103. [DOI] [PubMed] [Google Scholar]
  • [18].Madl T, Network analysis of heart beat intervals using horizontal visibility graphs, In 2016 Computing in Cardiology Conference (CinC), 733–736, IEEE, 2016. [Google Scholar]
  • [19].Mansour T, Combinatorics of Set Partitions, CRC Press, 2013. [Google Scholar]
  • [20].Mansour T and Shattuck M, Counting water cells in bargraphs of compositions and set partitions, Appl. Anal. Discrete Math 12 (2018), 413–438. [Google Scholar]
  • [21].Manshour P, Complex network approach to fractional time series, Chaos 25 (2015), 103105. [DOI] [PubMed] [Google Scholar]
  • [22].Manshour P, Rahimi Tabar MR, and Peinche J, Fully developed turbulence in the view of horizontal visibility graphs, J. Stat. Mech. Theory Exp 2015, P08031. [Google Scholar]
  • [23].Nuñez AM, Lacasa L, Gomez JP, and Luque B, Visibility algorithms: a short review. In: Zhang Y (Ed.), New Frontiers in Graph Theory, 119–152, InTech, Rijeka, 2012. [Google Scholar]
  • [24].Núñez ÁM, Luque B, Lacasa L, Gómez JP, and Robledo A, Horizontal visibility graphs generated by type-II intermittency, J. Phys. A 47 (2014), 035102. [DOI] [PubMed] [Google Scholar]
  • [25].Rong L and Shang P, Topological entropy and geometric entropy and their application to the horizontal visibility graph for financial time series, Nonlinear Dyn. 92 (2018), 41–58. [Google Scholar]
  • [26].Ravetti MG, Carpi LC, Gon¸alves BA, Frery AC, and Rosso OA, Distinguishing noise from chaos: Objective versus subjective criteria using horizontal visibility graph, PLoS ONE 9 (2014), e108004. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [27].Sannino S, Stramaglia S, Lacasa L, and Marinazzo D, Visibility graphs for fMRI data: Multiplex temporal graphs and their modulations across resting-state networks, Netw. Neurosci 3 (2017), 208–221. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [28].Stam AJ, Generation of random partitions of a set by an urn model, J. Combin. Theory Ser. A 35 (1983), 231–240. [Google Scholar]
  • [29].Stephen C, Horizon visibility graphs and time series merge trees are dual, 2019, preprint is available at https://arxiv.org/abs/1906.08825.
  • [30].Telesca L and Chelidze T, Visibility graph analysis of seismicity around Enguri High Arch Dam, Caucasus, Bull. Seismol. Soc. Am 108 (2018), 3141–3147. [Google Scholar]
  • [31].Xie W-J and Zhou W-X, Horizontal visibility graphs transformed from fractional Brownian motions: Topological properties versus the Hurst index, Phys. A 390 (2011), 3592. [Google Scholar]
  • [32].Xie W-J, Han R-Q, and Zhou W-X, Tetradic motif profiles of horizontal visibility graphs, Commun. Nonlinear Sci. Numer. Simul 72 (2019), 544–551. [Google Scholar]
  • [33].Zhang Y, Shang P, Xiong H, and Xia J, Multiscale analysis of time irreversibility based on phase-space reconstruction and horizontal visibility graph approach, Fluct. Noise Lett 17 (2018), 1850006. [Google Scholar]
  • [34].Zou H-L, Yu Z-G, Anh V, and Ma YL, From standard alpha-stable Lévy motions to horizontal visibility networks: dependence of multifractal and Laplacian spectrum, J. Stat. Mech. Theory Exp 2018, 053403. [Google Scholar]
  • [35].Zou Y, Donner RV, Marwan N, Donges JF, and Kurths J, Complex network approaches to nonlinear time series analysis, Phys. Rep 787 (2019), 1–97. [Google Scholar]

RESOURCES