<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Phys.</journal-id>
<journal-title>Frontiers in Physics</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Phys.</abbrev-journal-title>
<issn pub-type="epub">2296-424X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">735998</article-id>
<article-id pub-id-type="doi">10.3389/fphy.2021.735998</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Physics</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>A Novel Edge Rewire Mechanism Based on Multiobjective Optimization for Network Robustness Enhancement</article-title>
<alt-title alt-title-type="left-running-head">Li et&#x20;al.</alt-title>
<alt-title alt-title-type="right-running-head">Network Rewire Mechanism</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Li</surname>
<given-names>Zhaoxing</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1395246/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Liu</surname>
<given-names>Qionghai</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Chen</surname>
<given-names>Li</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
</contrib-group>
<aff id="aff1">
<label>
<sup>1</sup>
</label>College of Information Engineering, Yulin University, <addr-line>Yulin</addr-line>, <country>China</country>
</aff>
<aff id="aff2">
<label>
<sup>2</sup>
</label>School of Information Technology, Northwest University, <addr-line>Xi&#x2019;an</addr-line>, <country>China</country>
</aff>
<aff id="aff3">
<label>
<sup>3</sup>
</label>Yellow River, Shaanxi and Mongolia Supervision Bureau, <addr-line>Yulin</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/966342/overview">Zhanwei Du</ext-link>, University of Texas at Austin, United&#x20;States</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1395336/overview">Liping Huang</ext-link>, Nanyang Technological University, Singapore</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1395349/overview">Qing Cai</ext-link>, Nanyang Technological University, Singapore</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Zhaoxing Li, <email>abde0309@163.com</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Social Physics, a section of the journal Frontiers in Physics</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>10</day>
<month>08</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="collection">
<year>2021</year>
</pub-date>
<volume>9</volume>
<elocation-id>735998</elocation-id>
<history>
<date date-type="received">
<day>04</day>
<month>07</month>
<year>2021</year>
</date>
<date date-type="accepted">
<day>21</day>
<month>07</month>
<year>2021</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2021 Li, Liu and Chen.</copyright-statement>
<copyright-year>2021</copyright-year>
<copyright-holder>Li, Liu and Chen</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these&#x20;terms.</p>
</license>
</permissions>
<abstract>
<p>A complex network can crash down due to disturbances which significantly reduce the network&#x2019;s robustness. It is of great significance to study on how to improve the robustness of complex networks. In the literature, the network rewire mechanism is one of the most widely adopted methods to improve the robustness of a given network. Existing network rewire mechanism improves the robustness of a given network by re-connecting its nodes but keeping the total number of edges or by adding more edges to the given network. In this work we propose a novel yet efficient network rewire mechanism which is based on multiobjective optimization. The proposed rewire mechanism simultaneously optimizes two objective functions, i.e.,&#x20;maximizing network robustness and minimizing edge rewire operations. We further develop a multiobjective discrete partite swarm optimization algorithm to solve the proposed mechanism. Compared to existing network rewire mechanisms, the developed mechanism has two advantages. First, the proposed mechanism does not require specific constraints on the rewire mechanism to the studied network, which makes it more feasible for applications. Second, the proposed mechanism can suggest a set of network rewire choices each of which can improve the robustness of a given network, which makes it be more helpful for decision makings. To validate the effectiveness of the proposed mechanism, we carry out experiments on computer-generated Erd&#x151;s&#x2013;R&#xe9;nyi and scale-free networks, as well as real-world complex networks. The results demonstrate that for each tested network, the proposed multiobjective optimization based edge rewire mechanism can recommend a set of edge rewire solutions to improve its robustness.</p>
</abstract>
<kwd-group>
<kwd>complex networks</kwd>
<kwd>network robustness</kwd>
<kwd>network rewire mechanism</kwd>
<kwd>multiobjective optimization</kwd>
<kwd>partite swarm optimization</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>In our daily life, complex networks are ubiquitous [<xref ref-type="bibr" rid="B1">1</xref>&#x2013;<xref ref-type="bibr" rid="B3">3</xref>]. We rely on diverse kinds of complex networks as they play a very important role in our lives [<xref ref-type="bibr" rid="B4">4</xref>&#x2013;<xref ref-type="bibr" rid="B6">6</xref>]. For example, we rely on transportation networks to travel around the world, while we count on power grid networks to provide power supplies to ensure social productions and lives [<xref ref-type="bibr" rid="B7">7</xref>]. Complex networks are so important to us. However, complex networks in real-world often suffer from unpredictable disturbances such as random component failures and/or target attacks [<xref ref-type="bibr" rid="B8">8</xref>,<xref ref-type="bibr" rid="B9">9</xref>]. Those disturbances can lead to the dysfunction of network components [<xref ref-type="bibr" rid="B10">10</xref>]. Because the components of a network generally interact with each other, therefore the dysfunction of some components can trigger the dysfunction of other components and system-level disasters even can appear. It is therefore of great scientific and social values to ensure the stabilities and reliabilities of complex networks [<xref ref-type="bibr" rid="B11">11</xref>,<xref ref-type="bibr" rid="B12">12</xref>].</p>
<p>Up to now, scientists have developed many ways to quantify stabilities and reliabilities of complex networks [<xref ref-type="bibr" rid="B13">13</xref>,<xref ref-type="bibr" rid="B14">14</xref>]. One of the most effective ways is based on network robustness analysis [<xref ref-type="bibr" rid="B15">15</xref>]. The robustness of a network quantifies the capability of the network to survive disturbances. Scientists in the past decade have carried out many studies on network robustness. The majority of existing studies on network robustness of based on graph theories [<xref ref-type="bibr" rid="B16">16</xref>,<xref ref-type="bibr" rid="B17">17</xref>]. A graph is a straightforward yet effective modelling of a complex network. The nodes of a graph are the entities of a complex network, while the edges of the graph represent the interactions among the entities. Existing studies on network robustness can be roughly grouped into two classes. The first class aims to develop quantitative metrics to measure the robustness of a given network. The second class is dedicated to investigating models and theories to improve the robustness of a given network.</p>
<p>Regarding network robustness quantification, one of the most studied methods is the percolation theories [<xref ref-type="bibr" rid="B18">18</xref>,<xref ref-type="bibr" rid="B19">19</xref>]. Suppose that 1 &#x2212; <italic>p</italic> portion of the nodes of a network lose their functionalities due to disturbances. Then the purpose of percolation theories is to mathematically calculate the remaining portion of nodes. Such kind of percolation theories are termed as site percolation [<xref ref-type="bibr" rid="B4">4</xref>]. Note that the remaining portion of nodes is no higher than <italic>p</italic> since the dysfunction of some nodes can lead to the dysfunction of other nodes that rely on those initially failed nodes. Because the dysfunction can be happened to the edges of a network, the corresponding percolation theories are deemed as bond percolation [<xref ref-type="bibr" rid="B4">4</xref>]. It has been widely reported that many complex networks show community structures [<xref ref-type="bibr" rid="B20">20</xref>]. A network community is commonly regarded as a subnetwork of a given network and the similarities between nodes within the community are high while similarities between communities are low. For a network with community structure, when some of its components are failed, then those failed components will first affect components in their own communities. Therefore, some researchers also investigate the robustness of complex networks to component failures at a mix-level. For example, the work in [<xref ref-type="bibr" rid="B21">21</xref>] for the first time investigated the robustness of ecological networks to the species loss of community. Interestingly, they discovered that the community-level robustness of ecological networks has positive correlation with that of node-level robustness.</p>
<p>Percolation theories provide a way to measure the robustness of complex networks. Another challenging question is how to improve the robustness of complex networks. For real-world applications, the back-up mechanism is widely used [<xref ref-type="bibr" rid="B16">16</xref>]. Literally, the back-up mechanism improves the robustness of a network by backing up its critical components. Note that to back-up a network component needs extra resources and sometimes it is not easy to do that. For example, it may be difficult to back up a power station due to physical connection issues. Consequently, scientists have developed another effective way, i.e.,&#x20;network rewire mechanism, to improve the robustness of complex networks [<xref ref-type="bibr" rid="B22">22</xref>,<xref ref-type="bibr" rid="B23">23</xref>]. A network rewire mechanism changes the connections between the nodes of a network so as to improve its robustness. Generally, a rewire mechanism is subject to the constraint that the total number of edges is fixed. However, some researchers propose to discard this constraint when design network rewire mechanisms&#x20;[<xref ref-type="bibr" rid="B24">24</xref>].</p>
<p>Network rewire mechanisms have been proved to be very effective for improving network robustness. However, existing network rewire mechanisms have two major drawbacks. The first one is that a rewire mechanism normally generates a robust network whose structure is quite different from its original one. This drawback makes existing rewire mechanisms hard to be applied to real situations. The second one is that existing rewire mechanisms can only generate single solutions which is not intelligent for smart and personalized decision making.</p>
<p>In order to overcome those two drawbacks mentioned above, in this paper we suggest a novel network rewire mechanism for improving network robustness. Specifically, we propose a multiobjective optimization based network rewire mechanism. The proposed mechanism simultaneously optimizes two objectives. The first objective is to maximize the network robustness. This objective makes sure that a feasible network rewire solution definitely increase the robustness of the studied network. The second objective is to minimize the number of network rewire operations. This objective ensures that a feasible network rewire solution can improve the robustness of the studied network by implementing as small number of rewire operations as possible, making the proposed network rewire mechanism be of practical use. In order to solve the optimization based model, we further develop a multiobjective particle swarm optimization algorithm. Each time we run the developed algorithm, the algorithm can generate a set of solutions. Each solution denotes a network rewire choice with which the robustness of the studied network can be improved. Compared to existing network rewire mechanisms, the newly proposed network rewire mechanism better facilitates decision making. In order to validate the effectiveness of the proposed mechanism, we carry out experiments on Erd&#x151;s&#x2013;R&#xe9;nyi and scale-free networks that are generated using computer models. We also carry out experiments on several real-world complex networks. Experiments demonstrate that the proposed optimization-based network rewire mechanism can provide many different choices to improve the robustness of the tested networks. For real-world applications, one may analyze the detailed properties of the given network and decide which choices can be chosen to improve the network&#x2019;s robustness.</p>
<p>The remainder of this paper is organized as follows. <xref ref-type="sec" rid="s2">Section 2</xref> presents preliminaries for better understanding of this work. <xref ref-type="sec" rid="s3">Section 3</xref> formulates the proposed research problem and <xref ref-type="sec" rid="s4">Section 4</xref> delineates the designed algorithm to solve the proposed problem. <xref ref-type="sec" rid="s5">Section 5</xref> demonstrates the experiments and <xref ref-type="sec" rid="s6">Section 6</xref> concludes the&#x20;paper.</p>
</sec>
<sec id="s2">
<title>2 Related Backgrounds</title>
<sec id="s2-1">
<title>2.1 Network Notations</title>
<p>A complex network is usually represented by a graph. A graph consists of nodes and edges. In the literature, a node also can&#x20;be&#x20;called a vertex while an edge can be called a link. Mathematically, a graph is generally denoted by <italic>G</italic>&#x20;&#x3d; {<italic>V</italic>, <italic>E</italic>}. In this kind of notation, the symbol <italic>V</italic> represents the node set&#x20;and the symbol <italic>E</italic> represents the edge set. The nodes of a&#x20;graph represent the entities of a network that the graph models, while the edges represent the relationships between the entities.</p>
<p>The relationships between the nodes of a graph can be depicted using its adjacency matrix which is usually denoted by <bold>A</bold>. <xref ref-type="fig" rid="F1">Figure&#x20;1</xref> shows an example of a simple network together with its corresponding adjacency matrix.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>An example of a simple network together with its corresponding adjacency matrix.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g001.tif"/>
</fig>
<p>For the graph <italic>G</italic> shown in <xref ref-type="fig" rid="F1">Figure&#x20;1</xref> with <italic>n</italic>&#x20;&#x3d; 9 nodes, its adjacency matrix is normally with size <italic>n</italic>&#x20;&#xd7; <italic>n</italic>. The element of <bold>A</bold> is usually denoted by <italic>a</italic>
<sub>
<italic>ij</italic>
</sub>, representing the relationship between nodes <italic>i</italic> and <italic>j</italic>. Note that the value of <italic>a</italic>
<sub>
<italic>ij</italic>
</sub> is problem-specific. For a binary network with <italic>a</italic>
<sub>
<italic>ij</italic>
</sub> &#x2208; {1, 0}, the element <italic>a</italic>
<sub>
<italic>ij</italic>
</sub> only represents whether there is connection between nodes <italic>i</italic> and&#x20;<italic>j</italic>.</p>
</sec>
<sec id="s2-2">
<title>2.2 Network Rewire Mechanism</title>
<p>A network rewire mechanism is usually used in the network science domain. For a given network <italic>G</italic>, a network rewire mechanism aims to generate a new network <italic>G</italic>&#x2032;. <xref ref-type="fig" rid="F2">Figure&#x20;2</xref> shows an example of a simple network rewire mechanism.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>An example of a simple network rewire mechanism.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g002.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="F2">Figure&#x20;2</xref>, the original network has 10 nodes and 11 edges. After adopting a simple rewire mechanism, network <italic>G</italic> has been changed into network <italic>G</italic>&#x2032;. It can be seen from the figure that the network rewire mechanism just changes the edge connections between the nodes and does not change the total number of edges of the original network.</p>
</sec>
<sec id="s2-3">
<title>2.3 Particle Swarm Optimization</title>
<p>Many real-world problems can be reformulated as optimization problems. Because real-world problems could be very difficult, therefore when turning a real-world problem into an optimization problem, the optimization formula may not have mathematical properties like gradient. In this case, mathematical methods cannot solve such kind of optimization problems.</p>
<p>In order to solve optimization problems that cannot be solving using traditional mathematical methods, scientists have developed the so called bio-inspired algorithms [<xref ref-type="bibr" rid="B25">25</xref>,<xref ref-type="bibr" rid="B26">26</xref>] and amongst which is the particle swarm optimization algorithm (PSO) [<xref ref-type="bibr" rid="B27">27</xref>&#x2013;<xref ref-type="bibr" rid="B29">29</xref>].</p>
<p>Suppose that one aims to maximize a function <italic>f</italic>(<italic>x</italic>) with <italic>x</italic> being the argument by using PSO. Then a PSO algorithm works with a swarm or a population of individuals. Each individual is a feasible solution <italic>x</italic> to the optimized problem <italic>f</italic>(<italic>x</italic>). Let us use p<sub>
<italic>i</italic>
</sub> to denote the <italic>i</italic>th population and <italic>x</italic>
<sub>
<italic>j</italic>
</sub> &#x2208;p<sub>
<italic>i</italic>
</sub> to denote the <italic>j</italic>th individual in p<sub>
<italic>i</italic>
</sub>. Then a PSO algorithm iteratively evolves p<sub>
<italic>i</italic>
</sub> to approximate the optimal solutions to <italic>f</italic>(<italic>x</italic>). During each iteration, the algorithm updates individual <italic>x</italic>
<sub>
<italic>j</italic>
</sub> in the following way:<disp-formula id="e1">
<mml:math id="m1">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
<label>(1)</label>
</disp-formula>where <italic>v</italic>
<sub>
<italic>j</italic>
</sub> is the velocity of individual <italic>x</italic>
<sub>
<italic>j</italic>
</sub>. The velocity <italic>v</italic>
<sub>
<italic>j</italic>
</sub> is calculated as follows<disp-formula id="e2">
<mml:math id="m2">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>w</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">L</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi mathvariant="bold-italic">G</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(2)</label>
</disp-formula>where <italic>w</italic>, <italic>c</italic>
<sub>1</sub> and <italic>c</italic>
<sub>2</sub> are three constants. <italic>r</italic>
<sub>1</sub> and <italic>r</italic>
<sub>2</sub> are two random number with <italic>r</italic>
<sub>1</sub>, <italic>r</italic>
<sub>2</sub> &#x2208; [0, 1]. The symbol <bold>
<italic>L</italic>
</bold>
<sub>
<italic>j</italic>
</sub> is the personally best individual of <italic>x</italic>
<sub>
<italic>j</italic>
</sub>, i.e.,&#x20;the best solution that individual <italic>x</italic>
<sub>
<italic>j</italic>
</sub> has so far found. The symbol <bold>
<italic>G</italic>
</bold> is the globally best individual found by all the individuals.</p>
<p>Note that an individual updates its velocity <italic>v</italic>
<sub>
<italic>j</italic>
</sub> by referring to its historical information and the information from the whole population. The new velocity <italic>v</italic>
<sub>
<italic>j</italic>
</sub> then could help individual <italic>x</italic>
<sub>
<italic>j</italic>
</sub> to explore to promising area. During each iteration, the algorithm updates <italic>L</italic>
<sub>
<italic>j</italic>
</sub> and <bold>
<italic>G</italic>
</bold>. By iteratively evolving p<sub>
<italic>i</italic>
</sub> for a prescribed number of iteration, the algorithm stops and <bold>
<italic>G</italic>
</bold> therefore is regarded as the optimal solution(s) to the original optimization problem.</p>
</sec>
</sec>
<sec id="s3">
<title>3 Research Problem and Problem Formulation</title>
<sec id="s3-1">
<title>3.1 Network Robustness Measurement</title>
<p>The research aims to enhance the robustness of a given network by proposing a novel network rewire mechanism. To do so, first we need to know how to quantify the robustness of a given network. In the literature, there are many studies on network robustness [<xref ref-type="bibr" rid="B16">16</xref>,<xref ref-type="bibr" rid="B30">30</xref>]. As a consequence, many methods have been developed by scientists to quantify the robustness of complex networks [<xref ref-type="bibr" rid="B13">13</xref>,<xref ref-type="bibr" rid="B31">31</xref>] and amongst which is the method based on spectral analysis&#x20;[<xref ref-type="bibr" rid="B31">31</xref>].</p>
<p>Given a network <italic>G</italic> with its adjacency matrix being denoted by A. Let us use <italic>d</italic>
<sub>
<italic>i</italic>
</sub> to represent the degree of node <italic>i</italic>, i.e.,&#x20;the number of edges attached to <italic>i</italic>. Then one can easily obtain a diagonal matrix D in which its <italic>i</italic>th element is <italic>d</italic>
<sub>
<italic>i</italic>
</sub>. In the literature, the Laplacian matrix L of network <italic>G</italic> is defined as<disp-formula id="e3">
<mml:math id="m3">
<mml:mi mathvariant="bold">L</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi mathvariant="bold">D</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="bold">A</mml:mi>
</mml:math>
<label>(3)</label>
</disp-formula>For the matrix L we can work out all its eigenvalues <bold>
<italic>&#x3bb;</italic>
</bold>. An eigenvalue <italic>&#x3bb;</italic> satisfies the following relation<disp-formula id="e4">
<mml:math id="m4">
<mml:mi mathvariant="bold">L</mml:mi>
<mml:mi mathvariant="bold-italic">x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi mathvariant="bold-italic">x</mml:mi>
</mml:math>
<label>(4)</label>
</disp-formula>in which <italic>x</italic> is the corresponding eigenvector. Let <italic>&#x3bb;</italic>
<sub>2</sub> &#x2208; <italic>&#x3bb;</italic> be the second smallest non-negative eigenvalue of matrix L. It has been found that <italic>&#x3bb;</italic>
<sub>2</sub> has a positive relationship with the network&#x2019;s connectivity [<xref ref-type="bibr" rid="B31">31</xref>]. As a consequence, in the literature scientists use it as a metric to quantify the network&#x2019;s robustness. Due to its computationally friendly feature, in this study we use <italic>&#x3bb;</italic>
<sub>2</sub> as the network robustness quantification metric. Normally, the larger the value of <italic>&#x3bb;</italic>
<sub>2</sub>, the more robust the given network.</p>
</sec>
<sec id="s3-2">
<title>3.2 Proposed Network Rewire Mechanism</title>
<p>In this work, we propose a new network rewire mechanism to enhance the robustness of a given complex network. <xref ref-type="fig" rid="F3">Figure&#x20;3</xref> takes a simple network as an example to show the basic idea of the proposed network rewire mechanism.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>The basic idea of the proposed network rewire mechanism to enhance the robustness of a given complex network. In the proposed rewire mechanism, both edge additions and deletions are allowed without extra constrains.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g003.tif"/>
</fig>
<p>On the left hand side of <xref ref-type="fig" rid="F3">Figure&#x20;3</xref> is a simple network <italic>G</italic>
<sub>0</sub> with 10 nodes. The network <italic>G</italic>
<sub>0</sub> originally carries with 11 edges. In order to enhance its robustness, existing rewire mechanisms change the edge connections. Specifically, they reconnect the nodes and aim to find out a new network <italic>G</italic>
<sub>1</sub> with exactly the same number of edges and higher network robustness.</p>
<p>In this work we propose a novel rewire mechanism as shown on the right hand side of <xref ref-type="fig" rid="F3">Figure&#x20;3</xref>. The proposed mechanism does not require that <italic>G</italic>
<sub>1</sub> has exactly the same number of <italic>G</italic>. As can be seen from the right hand side of <xref ref-type="fig" rid="F3">Figure&#x20;3</xref>, we delete some edges from <italic>G</italic>. We also add new edges between the nodes. As long as <italic>G</italic>
<sub>1</sub> has higher network robustness than <italic>G</italic>, then we can both delete edges from and add new ones to <italic>G</italic>. As compared to existing rewire mechanisms, the newly proposed mechanism is more flexible and could be more of practical&#x20;usage.</p>
<p>Note that for a given network there are many choices for edge deletion and addition. In order to determine which edges can be deleted and added, we propose a multiobjective optimization model which will be described in detail in the subsequent subsection.</p>
</sec>
<sec id="s3-3">
<title>3.3 Proposed Optimization Model</title>
<p>For a given network <italic>G</italic> we adopt the <italic>&#x3bb;</italic>
<sub>2</sub> metric to quantify its robustness. The proposed network rewire mechanism aims to enhance <italic>G</italic>&#x2019;s robustness by removing and adding edges. Specifically, we propose the following multiobjective optimization model.<disp-formula id="e5">
<mml:math id="m5">
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="cases">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:msub>
<mml:mrow>
<mml:mi>f</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mspace width="0.17em"/>
<mml:mspace width="0.17em"/>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:msub>
<mml:mrow>
<mml:mi>f</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mspace width="0.17em"/>
<mml:mspace width="0.17em"/>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:msub>
<mml:mrow>
<mml:mi>f</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mspace width="0.17em"/>
<mml:mspace width="0.17em"/>
<mml:mo stretchy="false">&#x7c;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>E</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2b;</mml:mo>
</mml:mrow>
</mml:msup>
<mml:mo stretchy="false">&#x7c;</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(5)</label>
</disp-formula>in which <inline-formula id="inf1">
<mml:math id="m6">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> is the robustness of <italic>G</italic>, <italic>E</italic>
<sup>&#x2212;</sup> is the set of edges to be deleted from <italic>G</italic> and <italic>E</italic>
<sup>&#x2b;</sup> is set of edges to be added to <italic>G</italic>. For network <italic>G</italic> the proposed rewire mechanism removes edges in the set <italic>E</italic>
<sup>&#x2212;</sup> and adds edges in the set <italic>E</italic>
<sup>&#x2b;</sup>. Then <italic>G</italic> becomes <italic>G</italic>
<sub>1</sub> with respect to <italic>E</italic>
<sup>&#x2212;</sup> and <italic>E</italic>
<sup>&#x2b;</sup> and <inline-formula id="inf2">
<mml:math id="m7">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> is its corresponding robustness.</p>
<p>In the above model, objective <italic>f</italic>
<sub>1</sub> aims to maximize the robustness of <italic>G</italic>
<sub>1</sub>. Both objectives <italic>f</italic>
<sub>2</sub> and <italic>f</italic>
<sub>3</sub> aim to minimize the edge operations. For a network in reality, it is not good to remove a large amount of edges from the network as it will change the network&#x2019;s structure a lot. Objective <italic>f</italic>
<sub>2</sub> then constraints this operation. Similarly, it is not practical to add a large amount of edges to the network as adding new edges needs extra workload. Objective <italic>f</italic>
<sub>3</sub> is such a constraint to avoid this behaviour.</p>
<p>Note that existing rewire mechanisms also do edge addition and removal, i.e.,&#x20;they consider both objectives <italic>f</italic>
<sub>2</sub> and <italic>f</italic>
<sub>3</sub>. However, they require to remain the total number of edges in the network, i.e.,&#x20;they require that <italic>f</italic>
<sub>2</sub> &#x3d; <italic>f</italic>
<sub>3</sub>. In the newly proposed rewire mechanism, we do not pose such constraints. As a consequence, the proposed mechanism is of more practical use. For networks in which adding edges is more convenient than that of deleting edges, then we can minimize <italic>f</italic>
<sub>2</sub> but relax <italic>f</italic>
<sub>3</sub>. Similarly, if deleting edges is much easier than adding new ones, then we can pay more attention to&#x20;<italic>f</italic>
<sub>3</sub>.</p>
</sec>
</sec>
<sec id="s4">
<title>4 Algorithm Design</title>
<sec id="s4-1">
<title>4.1 Algorithm Framework</title>
<p>One may clearly see from <xref ref-type="disp-formula" rid="e5">Eq. 5</xref> that the proposed optimization model does not have a direct relationship between the decision variable (<italic>E</italic>
<sup>&#x2b;</sup> and <italic>E</italic>
<sup>&#x2212;</sup>) and the objective function values. A concrete solution of <italic>E</italic>
<sup>&#x2b;</sup> and <italic>E</italic>
<sup>&#x2212;</sup> cannot directly be substituted into the calculation of <italic>f</italic>
<sub>1</sub>. Meanwhile, <italic>E</italic>
<sup>&#x2b;</sup> and <italic>E</italic>
<sup>&#x2212;</sup> are edge&#x20;sets.</p>
<p>The proposed model contains three objectives. In order to solve it, traditional mathematical methods will apply weighted sum method to do it. However, since the edge sets are composed of links, therefore mathematical methods cannot solve <xref ref-type="disp-formula" rid="e5">Eq. 5</xref> as the decision variables are discrete and the objectives do not have any gradient information. Because the proposed optimization model given in <xref ref-type="disp-formula" rid="e5">Eq. 5</xref> involves three discrete objectives, in the literature, scientists have developed nature-inspired algorithms such as genetic algorithms (GAs) [<xref ref-type="bibr" rid="B32">32</xref>], particle swarm optimization algorithms (PSOs) [<xref ref-type="bibr" rid="B33">33</xref>], etc., to solve such kind of problems. Both GAs and PSOs are designed for single objective optimization. In order to solve multiobjective optimization, representative algorithms like the non-dominated sorting genetic algorithm-version II (NSGA-II) [<xref ref-type="bibr" rid="B34">34</xref>], multiobjective particle swarm optimization (MOPSO) [<xref ref-type="bibr" rid="B35">35</xref>], multiobjective evolutionary algorithm based on decomposition (MOEA/D) [<xref ref-type="bibr" rid="B36">36</xref>], etc., have been developed by scientists and been applied to solve many engineering problems.</p>
<p>In order to solve the model shown in <xref ref-type="disp-formula" rid="e5">Eq. 5</xref>, we in this work adopt the MOPSO algorithm proposed in [<xref ref-type="bibr" rid="B27">27</xref>]. The MOPSO algorithm is chosen because of its simplicity in terms of algorithm understanding and implementation. We redesign some operators of the MOPSO algorithm to make it fit for the model in <xref ref-type="disp-formula" rid="e5">Eq. 5</xref>. The whole algorithm framework for solve <xref ref-type="disp-formula" rid="e5">Eq. 5</xref> is given in <xref ref-type="fig" rid="F14">Algorithm&#x20;1</xref>.</p>
<fig id="F14" position="float">
<graphic xlink:href="fphy-09-735998-fx1.tif"/>
</fig>
<p>Step 4 of <xref ref-type="fig" rid="F14">Algorithm&#x20;1</xref> involves the individual representation method which will be described in the following subsection. Step 7a of <xref ref-type="fig" rid="F14">Algorithm&#x20;1</xref> evaluates a particle based on the proposed multiobjective optimization model. Step 10 of <xref ref-type="fig" rid="F14">Algorithm&#x20;1</xref> is the main for loop which mainly contains the particles&#x2019; position and velocity information update and this will be described in the following subsection. Note that the details for generating a testing network will be&#x20;provided in the experiment section and all the parameter settings will also be given in the experiment section.</p>
</sec>
<sec id="s4-2">
<title>4.2 Representation of Particle Potion</title>
<p>The algorithm proposed in [<xref ref-type="bibr" rid="B27">27</xref>] is for network clustering. The authors therefore developed an integer based particle position representation method. Since in this work we aim to do network rewire to enhance network robustness, we thus need to reconsider the way to represent a particle position.</p>
<p>Keep in mind that the purpose of the work is to find out the edge sets <italic>E</italic>
<sup>&#x2b;</sup> and <italic>E</italic>
<sup>&#x2212;</sup> so as to improve the robustness of a given network. For a given network <italic>G</italic>, we know its adjacency matrix A and its edge set <italic>E</italic>. We then can remove edges from <italic>E</italic> and <italic>E</italic>
<sup>&#x2212;</sup> can be&#x20;determined. Based on matrix A, we also know the possible new edges between the nodes and therefore can determine <italic>E</italic>
<sup>&#x2b;</sup>. Considering this, we thus propose the following way to represent the position of the <italic>i</italic>th particle of a PSO algorithm.<disp-formula id="e6">
<mml:math id="m8">
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>m</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>In <xref ref-type="disp-formula" rid="e6">Eq. 6</xref>, <italic>x</italic>
<sub>
<italic>ij</italic>
</sub> &#x2208;<bold> <italic>x</italic>
</bold>
<sub>
<italic>i</italic>
</sub> is a binary variable, i.e.,&#x20;<italic>x</italic>
<sub>
<italic>ij</italic>
</sub> &#x2208; {0, 1}. The length of <italic>x</italic>
<sub>
<italic>i</italic>
</sub> is <italic>m</italic> and <italic>m</italic>&#x20;&#x3d; <italic>n</italic>&#x20;&#xd7; (<italic>n</italic>&#x20;&#x2212; 1)/2. <xref ref-type="fig" rid="F4">Figure&#x20;4</xref> takes a simple network as an example to show how <xref ref-type="disp-formula" rid="e6">Eq. 6</xref>&#x20;works.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>An illustration of a simple network and a possible representation of a particle position.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g004.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="F4">Figure&#x20;4</xref>, the simple network <italic>G</italic> has five nodes and seven edges. Its adjacency matrix is given as A. In the figure there is a binary sequence <italic>x</italic> which represents a particle&#x2019;s position. This binary sequence represents a possible edge rewire solution. We first set up an empty matrix A&#x2032;. Then we turn the binary sequence <italic>x</italic> into the elements of the upper triangle matrix of matrix A&#x2032;. The upper triangle matrix then represents the new edge connection relationship and corresponds to the new network <italic>G</italic>&#x2032;.</p>
<p>As mentioned earlier, the purpose of this work is to find <italic>E</italic>
<sup>&#x2b;</sup> and <italic>E</italic>
<sup>&#x2212;</sup>. So the most straightforward way is to represent <italic>x</italic>
<sub>
<italic>i</italic>
</sub> as an adjacency matrix A&#x2032;. Based on the difference between A and A&#x2032; we can easily work out <italic>E</italic>
<sup>&#x2b;</sup> and <italic>E</italic>
<sup>&#x2212;</sup> and therefore can calculate the values of the objective functions. However, this kind of representation requires too much computer memories when <italic>n</italic> is very big. As can be seen from <xref ref-type="fig" rid="F4">Figure&#x20;4</xref>, the proposed representation mechanism can reduce the memory size by more than&#x20;half.</p>
</sec>
<sec id="s4-3">
<title>4.3 Representation of Particle Velocity</title>
<p>How to represent the velocity of a particle is related to the way how the position of the particle is represented, since the velocity vector help a partite to update its position information. As compared to the matrix representation method, the proposed particle position representation method is more convenient for the velocity representation.</p>
<p>Since in this work we propose to encode the edges in the upper triangle of the adjacency matrix of a given network using binary coding schema, therefore we decide to use binary representation of the velocity vector of a given particle. Specifically, for a given velocity vector <italic>v</italic>
<sub>
<italic>i</italic>
</sub> &#x3d; (<italic>v</italic>
<sub>
<italic>i</italic>1</sub>, <italic>v</italic>
<sub>
<italic>i</italic>2</sub>, &#x2026; , <italic>v</italic>
<sub>
<italic>im</italic>
</sub>) corresponding to particle <italic>x</italic>
<sub>
<italic>i</italic>
</sub>, its element <italic>v</italic>
<sub>
<italic>ij</italic>
</sub> &#x2208; {0, 1}. The element <italic>v</italic>
<sub>
<italic>ij</italic>
</sub> represents whether the <italic>j</italic>th element in the vector <italic>x</italic>
<sub>
<italic>i</italic>
</sub> will be changed or&#x20;not.</p>
</sec>
<sec id="s4-4">
<title>4.4 Update of Particle Position and Velocity</title>
<p>For the <italic>i</italic>th particle with <italic>x</italic>
<sub>
<italic>i</italic>
</sub> being its position vector, we update its position information with the following equation<disp-formula id="e7">
<mml:math id="m9">
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="bold-italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2295;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="bold-italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:math>
<label>(7)</label>
</disp-formula>in which the operator &#x2295; defines the operation for <italic>x</italic>
<sub>
<italic>i</italic>
</sub>&#x2019; as follows<disp-formula id="e8">
<mml:math id="m10">
<mml:mtable class="matrix">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msubsup>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mtd>
<mml:mtd columnalign="center">
<mml:mi>i</mml:mi>
<mml:mi>f</mml:mi>
</mml:mtd>
<mml:mtd columnalign="center">
<mml:msubsup>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(8)</label>
</disp-formula>
<disp-formula id="e9">
<mml:math id="m11">
<mml:mtable class="matrix">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msubsup>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x223c;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mtd>
<mml:mtd columnalign="center">
<mml:mi>i</mml:mi>
<mml:mi>f</mml:mi>
</mml:mtd>
<mml:mtd columnalign="center">
<mml:msubsup>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(9)</label>
</disp-formula>The velocity vector <italic>v</italic>
<sub>
<italic>i</italic>
</sub>&#x2032; of the <italic>i</italic>th particle is updated as follows<disp-formula id="e10">
<mml:math id="m12">
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="bold-italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi mathvariant="bold-italic">v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(10)</label>
</disp-formula>in which the speed vector <italic>v</italic> is calculated as<disp-formula id="e11">
<mml:math id="m13">
<mml:mtable class="matrix">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mi mathvariant="bold-italic">v</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>w</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">L</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">G</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(11)</label>
</disp-formula>where <bold>
<italic>G</italic>
</bold>
<sub>
<italic>r</italic>
</sub> &#x2208;<bold> <italic>G</italic>
</bold> is a solution randomly chosen from the global best solution set <bold>
<italic>G</italic>
</bold> and the symbol <italic>S</italic> () is a confining function which maps vector <italic>v</italic> into <italic>v</italic>
<sub>
<italic>i</italic>
</sub>&#x2032;. Specifically, <italic>S</italic> () works as follows<disp-formula id="e12">
<mml:math id="m14">
<mml:mtable class="matrix">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msubsup>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mtd>
<mml:mtd columnalign="center">
<mml:mi>i</mml:mi>
<mml:mi>f</mml:mi>
</mml:mtd>
<mml:mtd columnalign="center">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>e</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>,</mml:mo>
<mml:mspace width="0.17em"/>
<mml:mspace width="0.17em"/>
<mml:mspace width="0.17em"/>
<mml:mspace width="0.17em"/>
<mml:msub>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mi mathvariant="bold-italic">v</mml:mi>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(12)</label>
</disp-formula>
<disp-formula id="e13">
<mml:math id="m15">
<mml:mtable class="matrix">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msubsup>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mtd>
<mml:mtd columnalign="center">
<mml:mi>i</mml:mi>
<mml:mi>f</mml:mi>
</mml:mtd>
<mml:mtd columnalign="center">
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>e</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>,</mml:mo>
<mml:mspace width="0.17em"/>
<mml:mspace width="0.17em"/>
<mml:mspace width="0.17em"/>
<mml:mspace width="0.17em"/>
<mml:msub>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mi mathvariant="bold-italic">v</mml:mi>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(13)</label>
</disp-formula>It can be seen from the above equations that <italic>v</italic> is a real valued vector. By implementing the <italic>S</italic> () operation we turn <italic>v</italic> into a binary vector based on which we thus can update the particle&#x2019;s position information. Note that other functions also can be adopted to replace the <italic>S</italic> () function. However, there is no guarantee that other functions would perform better than the <italic>S</italic> () function does. The <italic>S</italic> () function is adopted because it is smooth in the objective&#x20;space.</p>
</sec>
<sec id="s4-5">
<title>4.5 Update of Local and Global Best Particles</title>
<p>Note that PSO is a population based algorithm. During the iterations we need to update the information of the local best individual <bold>
<italic>L</italic>
</bold>
<sub>
<italic>i</italic>
</sub> for all <italic>i</italic>&#x20;&#x2208; [1, <italic>psize</italic>] and the global best individual <bold>
<italic>G</italic>
</bold> since they help the entire swarm to explore for better solutions. <xref ref-type="fig" rid="F15">Algorithm&#x20;2</xref> presents the pseudocode for updating the local and global best particles in the adopted MOPSO algorithm.</p>
<fig id="F15" position="float">
<graphic xlink:href="fphy-09-735998-fx2.tif"/>
</fig>
<p>As can be seen from <xref ref-type="fig" rid="F15">Algorithm&#x20;2</xref>, during each iteration, when a new individual <italic>x</italic>
<sub>
<italic>i</italic>
</sub> is generated, we then evaluate its fitness. If <italic>x</italic>
<sub>
<italic>i</italic>
</sub> dominates its historical best <bold>
<italic>L</italic>
</bold>
<sub>
<italic>i</italic>
</sub> (step 1c of <xref ref-type="fig" rid="F15">Algorithm&#x20;2</xref>), then we replace <italic>L</italic>
<sub>
<italic>i</italic>
</sub> with <italic>x</italic>
<sub>
<italic>i</italic>
</sub>, otherwise, we keep <italic>L</italic>
<sub>
<italic>i</italic>
</sub> as it is. When a new population of individuals are generated, we then update <bold>
<italic>G</italic>
</bold>. Specifically, we use the Pareto solutions obtained from the current population to update those in the history. When any of the new Pareto solutions dominate any historical Pareto solutions, we then replace the old solutions with the new one (step 3 of <xref ref-type="fig" rid="F15">Algorithm&#x20;2</xref>).</p>
</sec>
</sec>
<sec id="s5">
<title>5 Experimental Study</title>
<sec id="s5-1">
<title>5.1 Network Datasets</title>
<sec id="s5-1-1">
<title>5.1.1&#x20;Computer-Generated Networks</title>
<p>In the experiments we first test the proposed edge rewire mechanism on computer-generated networks. Specifically, we generate two types of networks, i,e., Erd&#x151;s&#x2013;R&#xe9;nyi networks and scale-free networks. The degree of an Erd&#x151;s&#x2013;R&#xe9;nyi follows Poisson distribution while the degree of a scale-free network follows power law distribution.</p>
<p>In order to generate an Erd&#x151;s&#x2013;R&#xe9;nyi network with <italic>n</italic> nodes, we first generate an empty network <italic>G</italic>
<sub>
<italic>ER</italic>
</sub> with <italic>n</italic> nodes. We then define a constant <italic>d</italic>. Then we further define the connection probability <italic>r</italic>&#x20;as <italic>r</italic>&#x20;&#x3d; <italic>d</italic>/<italic>n</italic>. Then we connect each pair of nodes of <italic>G</italic>
<sub>
<italic>ER</italic>
</sub> with probability <italic>r</italic>. We have proved in our previous paper in [<xref ref-type="bibr" rid="B8">8</xref>] that the generated network appropriately follows the following degree distribution<disp-formula id="e14">
<mml:math id="m21">
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>e</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>d</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mfrac>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>d</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>!</mml:mo>
</mml:mrow>
</mml:mfrac>
</mml:math>
<label>(14)</label>
</disp-formula>The network <italic>G</italic>
<sub>
<italic>ER</italic>
</sub> therefore is an Erd&#x151;s&#x2013;R&#xe9;nyi network since its degree distribution follows the Poisson distribution and the average degree of <italic>G</italic>
<sub>
<italic>ER</italic>
</sub> is <italic>d</italic>. <xref ref-type="fig" rid="F5">Figure&#x20;5</xref> shows the degree distribution and the corresponding curve fitting of an example Erd&#x151;s&#x2013;R&#xe9;nyi network generated using the above mentioned method.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Degree distribution of a randomly generated Erd&#x151;s&#x2013;R&#xe9;nyi network (<italic>n</italic>&#x20;&#x3d; 1000, <italic>d</italic>&#x20;&#x3d; 6). The function <inline-formula id="inf8">
<mml:math id="m22">
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msup>
<mml:mrow>
<mml:mi>e</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msup>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>!</mml:mo>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> is used for curve fitting.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g005.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="F5">Figure&#x20;5</xref>, the Erd&#x151;s&#x2013;R&#xe9;nyi network is generated with <italic>n</italic>&#x20;&#x3d;&#x20;1000 and <italic>d</italic>&#x20;&#x3d; 6. A Poisson distribution function <inline-formula id="inf9">
<mml:math id="m23">
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msup>
<mml:mrow>
<mml:mi>e</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msup>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>!</mml:mo>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> is used to do the curve fitting. It can be seen from <xref ref-type="fig" rid="F5">Figure&#x20;5</xref> that <italic>a</italic>
<sub>1</sub> &#x3d; 1.01 and <italic>a</italic>
<sub>2</sub> &#x3d; 6.06. The curve fitting result complies well with the distribution given by <xref ref-type="disp-formula" rid="e14">Eq.&#x20;14</xref>.</p>
<p>In order to generate a scale-free network with <italic>n</italic> nodes, we first determine the exponent <italic>&#x3bb;</italic> in the degree distribution function <italic>p</italic>(<italic>k</italic>)&#x20;&#x3d; <italic>ck</italic>
<sup>&#x2212;<italic>&#x3bb;</italic>
</sup> with <italic>k</italic> being the nodes degree and <italic>c</italic> being a constant. We then determine the largest degree <italic>k</italic>
<sub>max</sub> and the smallest degree <italic>k</italic>
<sub>min</sub>. Based on the three parameters <italic>&#x3bb;</italic>, <italic>k</italic>
<sub>max</sub> and <italic>k</italic>
<sub>min</sub> we then solve the following equation<disp-formula id="e15">
<mml:math id="m24">
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:munderover>
<mml:mi>c</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mi>d</mml:mi>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:math>
<label>(15)</label>
</disp-formula>By solving the above equation we then work out the constant <italic>c</italic>. With all the above, we then sample a degree sequence <italic>k</italic>&#x20;&#x3d; (<italic>k</italic>
<sub>1</sub>, <italic>k</italic>
<sub>2</sub>, &#x2026; , <italic>k</italic>
<sub>
<italic>n</italic>
</sub>) from the degree distribution function <italic>p</italic>(<italic>k</italic>) &#x3d; <italic>ck</italic>
<sup>&#x2212;<italic>&#x3bb;</italic>
</sup>. Then we use the method proposed in [<xref ref-type="bibr" rid="B37">37</xref>] to work out networks <italic>G</italic>
<sub>
<italic>SF</italic>
</sub> whose has exactly the sampled degree sequence&#x20;<italic>k</italic>.</p>
<p>In <xref ref-type="fig" rid="F6">Figure&#x20;6</xref>, the scale-free network is generated with <italic>n</italic>&#x20;&#x3d; 100, <italic>&#x3bb;</italic>&#x20;&#x3d; 2.4, <italic>k</italic>
<sub>min</sub> &#x3d; 1, and <italic>k</italic>
<sub>min</sub> &#x3d; 10. A power-law distribution function <inline-formula id="inf10">
<mml:math id="m25">
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msup>
</mml:math>
</inline-formula> is used to do the curve fitting. It can be seen from&#x20;<xref ref-type="fig" rid="F6">Figure&#x20;6</xref> that <italic>a</italic>
<sub>1</sub> &#x3d; 0.77 and <italic>a</italic>
<sub>2</sub> &#x3d; 2.47. By solving <xref ref-type="disp-formula" rid="e15">Eq. 15</xref> we get <italic>C</italic>&#x20;&#x3d; 0.737. Therefore, the curve fitting result complies well with the theoretical analysis.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>Degree distribution of a randomly generated scale-free network (<italic>n</italic>&#x20;&#x3d; 100, <italic>&#x3bb;</italic> &#x3d; 2.4, <italic>k</italic>
<sub>min</sub> &#x3d; 1, <italic>k</italic>
<sub>min</sub> &#x3d; 10). The function <inline-formula id="inf11">
<mml:math id="m26">
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msup>
</mml:math>
</inline-formula> is used for curve fitting.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g006.tif"/>
</fig>
</sec>
<sec id="s5-1-2">
<title>5.1.2&#x20;Real-World Complex Networks</title>
<p>Apart from the computer-generated networks, in the experiments we also test the proposed edge rewire mechanism on several real-world networks. Specifically, the following networks chosen from the survey paper in [<xref ref-type="bibr" rid="B20">20</xref>] are tested.</p>
<sec id="s5-1-2-1">
<title>5.1.2.1 The Karate Network</title>
<p>This network contains 34 nodes and 78 edges. It depicts the&#x20;relationships between 34 members with the Karate club.&#x20;The edges represent the relationships among the members. The structure of the Karate network is shown in <xref ref-type="fig" rid="F7">Figure&#x20;7A</xref>.</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>Network structure visualization of (A) the Karate network, <bold>(B)</bold> the dolphin network, <bold>(C)</bold> the Football network and <bold>(D)</bold> the SFI network.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g007.tif"/>
</fig>
</sec>
<sec id="s5-1-2-2">
<title>5.1.2.2 The Dolphin Network</title>
<p>The dolphin network contains 62 nodes each of which represents a bottlenose dolphin. Three are 159 edges in the network. The edges are built based on statistically significant frequent association, i.e.,&#x20;their social behaviours. The structure of the Dolphin network is shown in <xref ref-type="fig" rid="F7">Figure&#x20;7B</xref>.</p>
</sec>
<sec id="s5-1-2-3">
<title>5.1.2.3 The Football Network</title>
<p>The football network represents the American football games between Division IA colleges during regular season Fall 2,000. The football network contains 115 nodes each of which represents a college. Three are 613 edges in the network. An edge is built between two nodes if the corresponding colleges have a game. The structure of the Football network is shown in <xref ref-type="fig" rid="F7">Figure&#x20;7C</xref>.</p>
</sec>
<sec id="s5-1-2-4">
<title>5.1.2.4 The SFI Network</title>
<p>The SFI network represents the collaborations between the scientists working with Santa Fe Institute during any part of calendar year 1999 or 2000. The SFI network contains 118 nodes and 200 edges. The structure of the SFI network is shown in <xref ref-type="fig" rid="F7">Figure&#x20;7D</xref>.</p>
<p>
<xref ref-type="fig" rid="F7">Figure&#x20;7</xref> visualizes the structures of the four tested real-world networks. These four networks are chosen because they have been widely used in the network science domain. Note that the four real-world networks are unweighted, i.e.,&#x20;they are binary networks. In the experiments, we only test the proposed mechanism on small-scale networks. On the one hand, the proposed mechanism can be tested on large-scale networks. On the other hand, testing on large-scale network is time consuming as the adopted PSO algorithm is a population based random search algorithm. As the main purpose of this work is to validate the feasibility of the proposed mechanism, therefore we do not carry out experiments on large-scale networks at the moment.</p>
</sec>
</sec>
</sec>
<sec id="s5-2">
<title>5.2 Parameter Settings</title>
<p>As mentioned above, when generating the networks we need to determine some parameters first. Meanwhile, for the introduced algorithm it also carries with several parameters. In the experiments, we set&#x20;all the needed parameters as what are shown in <xref ref-type="table" rid="T1">Table&#x20;1</xref>.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Settings of the parameters contained in the algorithm and the generated networks for testing.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th colspan="2" align="left">Network</th>
<th colspan="2" align="center">Algorithm</th>
</tr>
<tr>
<th align="center">Parameter</th>
<th align="center">Value</th>
<th align="center">Parameter</th>
<th align="center">Value</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">
<italic>n</italic>
</td>
<td align="char" char=".">(50, 100, 150)</td>
<td align="center">
<italic>ps</italic>
</td>
<td align="char" char=".">100</td>
</tr>
<tr>
<td align="left">
<italic>d</italic>
</td>
<td align="char" char=".">(4, 5, 6, 7)</td>
<td align="center">
<italic>np</italic>
</td>
<td align="char" char=".">100</td>
</tr>
<tr>
<td align="left">
<italic>&#x3bb;</italic>
</td>
<td align="char" char=".">(2, 2.4, 2.6, 2.8)</td>
<td align="center">
<italic>c</italic>
<sub>1</sub>
</td>
<td align="char" char=".">1.496</td>
</tr>
<tr>
<td align="left">
<italic>k</italic>
<sub>min</sub>
</td>
<td align="char" char=".">1</td>
<td align="center">
<italic>c</italic>
<sub>2</sub>
</td>
<td align="char" char=".">1.496</td>
</tr>
<tr>
<td align="left">
<italic>k</italic>
<sub>max</sub>
</td>
<td align="char" char=".">10</td>
<td align="center">
<italic>w</italic>
</td>
<td align="char" char=".">0.729</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Note that the main idea of this work is to validate if the proposed optimization based edge rewire mechanism is effective or not. Therefore, we do not set the value of <italic>n</italic> large enough. For a network with <italic>n</italic> nodes, there are maximum <italic>n</italic>&#x20;&#xd7; (<italic>n</italic>&#x20;&#x2212; 1)/2 edges. If <italic>n</italic> is too large, then the optimization process will take a long time to finish. In the experiments we set it to be small so as to quickly check if the proposed idea is feasible or not. This is the main reason why the tested real-world networks are small in&#x20;size.</p>
</sec>
<sec id="s5-3">
<title>5.3 Obtained Pareto Fronts</title>
<p>In the experiments, we generate two types of artificial networks. For each type of networks, we generate 12 networks with the configurations of the number of nodes and the degree control parameter, i.e.,&#x20;<italic>d</italic> for the Erd&#x151;s&#x2013;R&#xe9;nyi network and <italic>&#x3bb;</italic> for the scale-free network. <xref ref-type="fig" rid="F8">Figure&#x20;8</xref> and <xref ref-type="fig" rid="F9">Figure&#x20;9</xref> respectively visualize the Pareto fronts obtained by the introduced multiobjective particle swarm optimization algorithm when tested on the Erd&#x151;s&#x2013;R&#xe9;nyi and scale-free networks. Note that for each tested network we run the introduced multiobjective particle swarm optimization algorithm for 20 times. After each run we save the Pareto solutions. We eventually merge all the Pareto solutions over the 20 runs and filter out the final Pareto solutions based on Pareto dominance mechanism.</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption>
<p>Visualization of the Pareto fronts obtained by applying the introduced multiobjective particle swarm optimization algorithm to the generated Erd&#x151;s&#x2013;R&#xe9;nyi networks.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g008.tif"/>
</fig>
<fig id="F9" position="float">
<label>FIGURE 9</label>
<caption>
<p>Visualization of the Pareto fronts obtained by applying the introduced multiobjective particle swarm optimization algorithm to the generated scale-free networks.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g009.tif"/>
</fig>
<p>Both in <xref ref-type="fig" rid="F8">Figure&#x20;8</xref> and <xref ref-type="fig" rid="F9">Figure&#x20;9</xref> each row represents the results for networks with different sizes. In <xref ref-type="fig" rid="F8">Figure&#x20;8</xref>, each column corresponds to different <italic>d</italic>, while each column in <xref ref-type="fig" rid="F9">Figure&#x20;9</xref> corresponds to different <italic>&#x3bb;</italic>. We can clearly see from those two figures that the values of <italic>f</italic>
<sub>1</sub> for all the solutions are negative. This means that the robustness of the original networks have being improved based on the corresponding edge rewire mechanism. One may further see from the figures that the proposed multiobjective optimization based edge rewire mechanism can yield many different solutions to improve the robustness of a given network. Actually, this is one of the biggest advantages of the proposed edge rewire mechanism as compared to existing ones which can only provide single solutions for the decision makers. As can be seen from the two figures, each solution corresponds to edge deletions and additions but the number of added edges does not need to be equal to that of the deleted edges, which makes the proposed mechanism more flexible for real&#x20;use.</p>
<p>The above experiments are carried out on Erd&#x151;s&#x2013;R&#xe9;nyi networks and scale-free networks which are two important types of networks. In the next, we show the results on the four real-world networks. <xref ref-type="fig" rid="F10">Figure&#x20;10</xref> visualizes of the Pareto fronts obtained by the introduced algorithm when tested on the four networks.</p>
<fig id="F10" position="float">
<label>FIGURE 10</label>
<caption>
<p>Visualization of the Pareto fronts obtained by applying the introduced multiobjective particle swarm optimization algorithm to <bold>(A)</bold> the Karate network, <bold>(B)</bold> the dolphin network, <bold>(C)</bold> the Football network and <bold>(D)</bold> the SFI network.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g010.tif"/>
</fig>
<p>It also can be seen from <xref ref-type="fig" rid="F10">Figure&#x20;10</xref> similar phenomenon occurs to the tested real-world networks as compared to that of the computer-generated networks. More specifically, there are multiple Pareto solutions for improving the robustness of each of the tested real-world networks. The above experiments prove that the proposed edge rewire mechanism can reconnect those tested networks to improve their network robustness. In what follows, we analyze the robustness of the enhanced networks with respect to the obtained Pareto solutions.</p>
</sec>
<sec id="s5-4">
<title>5.4 Enhanced Network Robustness</title>
<p>The above experiments indicate that the proposed multiobjective optimization based edge rewire mechanism can help to improve the robustness of a given network. Note that by optimizing the proposed mechanism, a set of rewire solutions can be obtained. In this section we analyze the robustness improvement of two extreme solutions for each tested network.</p>
<p>As can be seen from <xref ref-type="fig" rid="F8">Figures 8</xref>&#x2013;<xref ref-type="fig" rid="F10">10</xref>, the Pareto front for each network contains a set of solutions. Here, we choose two extreme solutions from each Pareto front. For all the solutions, we sum up <italic>f</italic>
<sub>2</sub> and <italic>f</italic>
<sub>3</sub>. Then we choose the two extreme solutions as the two solutions that require the minimum number of edge operations including addition and deletion. We then calculate the ratio of robustness improvement. The results for all the tested artificial networks are shown in <xref ref-type="table" rid="T2">Table&#x20;2</xref>.</p>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Robustness improvement made by the two selected extreme solutions from the Pareto front for each of the tested Erd&#x151;s&#x2013;R&#xe9;nyi (ER) and scale-free (SF) networks.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Er</th>
<th align="center">
<italic>d</italic>&#x20;&#x3d; 4</th>
<th align="center">
<italic>d</italic>&#x20;&#x3d; 4</th>
<th align="center">
<italic>d</italic>&#x20;&#x3d; 5</th>
<th align="center">
<italic>d</italic>&#x20;&#x3d; 5</th>
<th align="center">
<italic>d</italic>&#x20;&#x3d; 6</th>
<th align="center">
<italic>d</italic>&#x20;&#x3d; 6</th>
<th align="center">
<italic>d</italic>&#x20;&#x3d; 7</th>
<th align="center">
<italic>d</italic>&#x20;&#x3d; 7</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">
<italic>n</italic>&#x20;&#x3d; 50</td>
<td align="char" char=".">55.5537</td>
<td align="char" char=".">89.5042</td>
<td align="char" char=".">2.6829</td>
<td align="char" char=".">6.1284</td>
<td align="char" char=".">13.9347</td>
<td align="char" char=".">11.4976</td>
<td align="char" char=".">4.8016</td>
<td align="char" char=".">4.9753</td>
</tr>
<tr>
<td align="left">
<italic>n</italic>&#x20;&#x3d; 100</td>
<td align="char" char=".">19.1287</td>
<td align="char" char=".">89.7005</td>
<td align="char" char=".">24.1805</td>
<td align="char" char=".">52.3923</td>
<td align="char" char=".">84.2993</td>
<td align="char" char=".">90.4997</td>
<td align="char" char=".">9.2648</td>
<td align="char" char=".">10.4689</td>
</tr>
<tr>
<td align="left">
<italic>n</italic>&#x20;&#x3d; 150</td>
<td align="char" char=".">144.3407</td>
<td align="char" char=".">148.6653</td>
<td align="char" char=".">55.7901</td>
<td align="char" char=".">83.6496</td>
<td align="char" char=".">17.4103</td>
<td align="char" char=".">81.3385</td>
<td align="char" char=".">62.9916</td>
<td align="char" char=".">71.7342</td>
</tr>
<tr>
<td align="left">SF</td>
<td align="center">
<italic>&#x3bb;</italic> &#x3d; 2</td>
<td align="center">
<italic>&#x3bb;</italic> &#x3d; 2</td>
<td align="center">
<italic>&#x3bb;</italic> &#x3d; 2.4</td>
<td align="center">
<italic>&#x3bb;</italic> &#x3d; 2.4</td>
<td align="center">
<italic>&#x3bb;</italic> &#x3d; 2.6</td>
<td align="center">
<italic>&#x3bb;</italic> &#x3d; 2.6</td>
<td align="center">
<italic>&#x3bb;</italic> &#x3d; 2.8</td>
<td align="center">
<italic>&#x3bb;</italic> &#x3d; 2.8</td>
</tr>
<tr>
<td align="left">
<italic>n</italic>&#x20;&#x3d; 50</td>
<td align="char" char=".">59.8475</td>
<td align="char" char=".">156.2997</td>
<td align="char" char=".">66.5295</td>
<td align="char" char=".">75.7222</td>
<td align="char" char=".">32.2473</td>
<td align="char" char=".">33.9289</td>
<td align="char" char=".">35.8288</td>
<td align="char" char=".">40.4335</td>
</tr>
<tr>
<td align="left">
<italic>n</italic>&#x20;&#x3d; 100</td>
<td align="char" char=".">325.3390</td>
<td align="char" char=".">653.7876</td>
<td align="char" char=".">316.2841</td>
<td align="char" char=".">712.6357</td>
<td align="char" char=".">219.9658</td>
<td align="char" char=".">234.9531</td>
<td align="char" char=".">111.1764</td>
<td align="char" char=".">155.4250</td>
</tr>
<tr>
<td align="left">
<italic>n</italic>&#x20;&#x3d; 150</td>
<td align="char" char=".">1813.5327</td>
<td align="char" char=".">1836.7281</td>
<td align="char" char=".">242.6360</td>
<td align="char" char=".">513.1527</td>
<td align="char" char=".">771.9283</td>
<td align="char" char=".">829.3302</td>
<td align="char" char=".">773.0175</td>
<td align="char" char=".">1816.6741</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>In <xref ref-type="table" rid="T2">Table&#x20;2</xref>, the robustness improvement is calculated as <inline-formula id="inf12">
<mml:math id="m27">
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>/</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>. In the table, we can see that for all the tested artificial networks, the robustness of the original networks have been greatly improved. We also observe from the table that when the size of a network is increased, then the robustness improvement will also be increased. This is because that a network with <italic>n</italic> nodes has <italic>n</italic>&#x20;&#xd7; (<italic>n</italic>&#x20;&#x2212; 1)/2 maximum number of edges. Thus, a larger network has larger maximum number of edges and there is larger probability to improve its robustness given the fact that the most robust network is a full connected network.</p>
<p>From <xref ref-type="table" rid="T2">Table&#x20;2</xref> we also notice that the robustness improvement for scale-free networks are more significant than that of Erd&#x151;s&#x2013;R&#xe9;nyi networks. This is because that a scale-free network has relatively less edges than an Erd&#x151;s&#x2013;R&#xe9;nyi network with the same number of nodes. Consequently, the proposed edge rewire mechanism can work better for improving the robustness of scale-free networks.</p>
<p>
<xref ref-type="table" rid="T3">Table&#x20;3</xref> records the robustness of the tested four real-world networks (recorded by <inline-formula id="inf13">
<mml:math id="m28">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>) as well as the robustness of the corresponding optimized networks (recorded by <italic>&#x3bb;</italic>
<sub>2</sub>&#x2032; and <inline-formula id="inf14">
<mml:math id="m29">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>) with respect to the selected extreme solutions. For the Karate network, its original robust is 0.4685 as can be seen from <xref ref-type="table" rid="T3">Table&#x20;3</xref>. By rewiring its edges with respect to the two selected solutions, the robustness of the two optimized networks are respectively 8.9665 and 9.0996, which are about 20&#x20;times of its original robustness. For the remaining three networks, their robustness also have been significantly improved based on the proposed edge rewire mechanism. The experiments on real-world networks also validate the effectiveness of the proposed rewire mechanism.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Robustness of the real-world networks and their optimized networks with respect to the two selected extreme solutions from the Pareto fronts.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Network</th>
<th align="center">
<inline-formula id="inf15">
<mml:math id="m30">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>
</th>
<th align="center">
<italic>&#x3bb;</italic>&#x2032;<sub>2</sub>
</th>
<th align="center">
<inline-formula id="inf16">
<mml:math id="m31">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula>
</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Karate</td>
<td align="char" char=".">0.4685</td>
<td align="char" char=".">8.9665</td>
<td align="char" char=".">9.0996</td>
</tr>
<tr>
<td align="left">Dolphin</td>
<td align="char" char=".">0.1730</td>
<td align="char" char=".">7.3211</td>
<td align="char" char=".">10.0706</td>
</tr>
<tr>
<td align="left">Football</td>
<td align="char" char=".">1.4590</td>
<td align="char" char=".">20.4772</td>
<td align="char" char=".">42.9840</td>
</tr>
<tr>
<td align="left">SFI</td>
<td align="char" char=".">0.0147</td>
<td align="char" char=".">18.3791</td>
<td align="char" char=".">40.9159</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s5-5">
<title>5.5 Optimized Network Structure</title>
<p>
<xref ref-type="table" rid="T2">Tables 2,</xref> <xref ref-type="table" rid="T3">3</xref> show that the robustness of the tested networks have been greatly improved. In this section we graphically visualize the optimized structures of the networks against the original ones. For simplicity, here we only visualize the structures of Erd&#x151;s&#x2013;R&#xe9;nyi networks for <italic>d</italic>&#x20;&#x3d; 4 and scale-free networks for <italic>&#x3bb;</italic> &#x3d;&#x20;2.</p>
<p>
<xref ref-type="fig" rid="F11">Figures 11</xref>, <xref ref-type="fig" rid="F12">12</xref> respectively visualize the original network structures (first column) and the optimized networks structures (second and third columns) for Erd&#x151;s&#x2013;R&#xe9;nyi networks for <italic>d</italic>&#x20;&#x3d; 4 and scale-free networks for <italic>&#x3bb;</italic> &#x3d; 2. We can see from <xref ref-type="fig" rid="F11">Figures 11</xref>, <xref ref-type="fig" rid="F12">12</xref> that the proposed edge rewire mechanism makes a given network have more edges to improve its robustness. As compared to Erd&#x151;s&#x2013;R&#xe9;nyi networks, the optimized scale-free networks seem to be much denser than their original networks. As explained earlier, this is because that a scale-free network has relatively less edges than a same sized Erd&#x151;s&#x2013;R&#xe9;nyi network.</p>
<fig id="F11" position="float">
<label>FIGURE 11</label>
<caption>
<p>Original (first column) and optimized structures (second and third columns) of the Erd&#x151;s&#x2013;R&#xe9;nyi networks for <italic>d</italic>&#x20;&#x3d; 4.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g011.tif"/>
</fig>
<fig id="F12" position="float">
<label>FIGURE 12</label>
<caption>
<p>Original (first column) and optimized structures (second and third columns) the scale-free networks for <italic>&#x3bb;</italic> &#x3d; 2.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g012.tif"/>
</fig>
<p>
<xref ref-type="fig" rid="F13">Figure&#x20;13</xref> visualizes the original network structures (first row) and the optimized networks structures (second and third rows) for the four tested real-world networks. It can be clearly seen from <xref ref-type="fig" rid="F11">Figures 11</xref>&#x2013;<xref ref-type="fig" rid="F13">13</xref> that the selected two solutions suggest to add more links to each of the tested network to improve its network robustness.</p>
<fig id="F13" position="float">
<label>FIGURE 13</label>
<caption>
<p>Original (first row) and optimized structures (second and third rows) of the four tested real-world networks.</p>
</caption>
<graphic xlink:href="fphy-09-735998-g013.tif"/>
</fig>
</sec>
<sec id="s5-6">
<title>5.6 Discussion</title>
<p>One may notice from <xref ref-type="fig" rid="F11">Figures 11</xref>&#x2013;<xref ref-type="fig" rid="F13">13</xref> that the proposed edge rewire mechanism tends to make a given network be denser in order to improve its robustness. This is not necessarily the feature of the proposed model. Actually, the proposed multiobjective optimization based rewire mechanism is very flexible. Note that in the proposed model we do not add in any constraints. We do not limit the number of deleted and added edges. As long as the edge operations can improve the robustness of a given network, then the multiobjective optimization algorithm will determine the goodness of the edge operations based on Pareto dominance mechanism. If the operations are non-dominated with each other, then those operations will be saved as the possible choices.</p>
<p>Note that in the experiments for a tested network, its number of edges is far less than that of the maximum number of edges it can has. This is especially true for the tested scale-free networks. A scale-free network is normally sparse in its connections. Therefore there could be many choices to improve its robustness. In order to avoid making a network be denser, we provide below some possible solutions.<list list-type="simple">
<list-item>
<p>1) One may consider to increase the population size of the particle swarm optimization algorithm and run it for more than 20&#x20;times to possibly obtain more Pareto solutions. Then one may expect to select Pareto solutions that do not make many edge reconnections. It is also suggested that one can try to redesign the algorithm operators especially the status update principles for the particle swarm optimization algorithm.</p>
</list-item>
<list-item>
<p>2) One may add extra constraints. For example, one can set the portion of maximum edge operations, i.e.,&#x20;instead of considering all the possible edges, one can just predefine the maximum number of edges allowed in a given network. For example, for a network with <italic>n</italic> nodes and <italic>m</italic> edges, it can have a maximum of <italic>n</italic> (<italic>n</italic>&#x20;&#x2212; 1)/2 edges. Then one&#x20;may add the constrain of <italic>f</italic>
<sub>2</sub> &#x2b; <italic>f</italic>
<sub>3</sub> &#x3c; <italic>&#x3b1;n</italic> (<italic>n</italic>&#x20;&#x2212; 1)/2 in which <italic>&#x3b1;</italic>&#x20;&#x2208;&#x20;(0,&#x20;1) is a control parameter.</p>
</list-item>
<list-item>
<p>3) For real applications, one may also consider the cost on the edge operations. For some networks, adding edges could be more costly than deleting edges, while the situation can be the opposite for some networks. Therefore, instead of directly using objectives <italic>f</italic>
<sub>2</sub> and <italic>f</italic>
<sub>3</sub>, one can design other cost functions. A straightforward way to achieve this goal is to punish the two objectives with different coefficients. For example, one can consider the objectives <italic>&#x3b2;f</italic>
<sub>2</sub> and (1 &#x2212; <italic>&#x3b2;</italic>)<italic>f</italic>
<sub>3</sub> with <italic>&#x3b2;</italic> &#x2208; [0,&#x20;1].</p>
</list-item>
</list>
</p>
</sec>
</sec>
<sec sec-type="conclusion" id="s6">
<title>6 Conclusion</title>
<p>The study on network robustness has attracted much attention in the past decade. In reality many complex networks will more or less suffer from external attacks. Those attacks to a network can lead to the failure of network nodes and edges. When some nodes and/or edges fail, the corresponding network could totally fail, which could bring about enormous losses. Network robustness estimates a network&#x2019;s ability to bear with attacks. To do research on network robustness can help the better design of network structures to improve their robustness.</p>
<p>In order to enhance the robustness of a complex network, in the literature one of the most effective ways is the network rewire mechanism which changes the edge connections between the nodes so as to improve the network&#x2019;s robustness. In this work we adopted spectral analysis to measure the robustness of a given network. We then proposed a multiobjective optimization based network rewire mechanism to enhance network robustness. The proposed edge rewire mechanism optimizes three objectives. The first one is the robustness improvement. The second one is to minimize edge deletions and the third is to minimize edge additions. To optimize the proposed mechanism, we further develop a multiobjective discrete partite swarm optimization algorithm to solve the proposed mechanism. Compared to traditional network rewire mechanism, the developed mechanism can generate a set of network rewire choices each of which can improve the robustness of a given network. To validate the effectiveness of the proposed mechanism, we carried out simulations on computer-generated Erd&#x151;s&#x2013;R&#xe9;nyi and scale-free networks as well as real-world networks. Experiments have validated the effectiveness of the proposed edge rewire mechanism.</p>
</sec>
</body>
<back>
<sec id="s7">
<title>Data Availability Statement</title>
<p>Publicly available datasets were analyzed in this study. This data can be found here: <ext-link ext-link-type="uri" xlink:href="http://www-personal.umich.edu/~mejn/netdata/">http://www-personal.umich.edu/~mejn/netdata/</ext-link>.</p>
</sec>
<sec id="s8">
<title>Author Contributions</title>
<p>ZL&#x2014;Conceptualization, Methodology, Writing-Original draft preparation. ZL and QL&#x2014;Data generating and collection. ZL, QL, and LC&#x2014;experiments and discussions, ZL, QL, and LC&#x2014;Writing&#x2014;Reviewing and Editing.</p>
</sec>
<sec id="s9">
<title>Funding</title>
<p>This work was supported by the Shanxi Provincial Key Research and Development Project (Grant No. 2020NY-176), the Science Project of Yulin High Tech Zone (Grant No. CXY-2020-32), and the Doctoral Research Startup Fund of Yulin University (Grant No. 16GK25).</p>
</sec>
<sec sec-type="COI-statement" id="s10">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec id="s11" sec-type="disclaimer">
<title>Publisher&#x2019;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cai</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Alam</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Duong</surname>
<given-names>VN</given-names>
</name>
</person-group>. <article-title>A Spatial-Temporal Network Perspective for the Propagation Dynamics of Air Traffic Delays</article-title>. <source>Engineering</source> (<year>2021</year>) <volume>7</volume>:<fpage>452</fpage>&#x2013;<lpage>64</lpage>. <pub-id pub-id-type="doi">10.1016/j.eng.2020.05.027</pub-id> </citation>
</ref>
<ref id="B2">
<label>2.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hoadley</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Bartolo</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Chesterman</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Faus</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Hernandez</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Kultys</surname>
<given-names>B</given-names>
</name>
<etal/>
</person-group> <article-title>A Global Community of Courts? Modelling the Use of Persuasive Authority as a Complex Network</article-title>. <source>Front Phys</source> (<year>2021</year>) <volume>9</volume>:<fpage>331</fpage>. <pub-id pub-id-type="doi">10.3389/fphy.2021.665719</pub-id> </citation>
</ref>
<ref id="B3">
<label>3.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hope</surname>
<given-names>SM</given-names>
</name>
<name>
<surname>Kundu</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Roy</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Manna</surname>
<given-names>SS</given-names>
</name>
<name>
<surname>Hansen</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Network Topology of the Desert Rose</article-title>. <source>Front Phys</source> (<year>2015</year>) <volume>3</volume>:<fpage>72</fpage>. <pub-id pub-id-type="doi">10.3389/fphy.2015.00072</pub-id> </citation>
</ref>
<ref id="B4">
<label>4.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Newman</surname>
<given-names>MEJ</given-names>
</name>
</person-group>. <source>Networks</source>. <publisher-name>Oxford University Press</publisher-name> (<year>2018</year>).</citation>
</ref>
<ref id="B5">
<label>5.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zang</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Wei</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>T</given-names>
</name>
</person-group>. <article-title>Complex Network-Based Transmission Network Vulnerability Assessment Using Adjacent Graphs</article-title>. <source>IEEE Syst J</source> (<year>2019</year>) <volume>14</volume>:<fpage>572</fpage>&#x2013;<lpage>81</lpage>. <pub-id pub-id-type="doi">10.1109/JSYST.2019.2934317</pub-id> </citation>
</ref>
<ref id="B6">
<label>6.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Deng</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Z</given-names>
</name>
</person-group>. <article-title>An Adaptive Population Control Framework for ACO-Based Community Detection</article-title>. <source>Chaos, Solitons &#x26; Fractals</source> (<year>2020</year>) <volume>138</volume>:<fpage>109886</fpage>. <pub-id pub-id-type="doi">10.1016/j.chaos.2020.109886</pub-id> </citation>
</ref>
<ref id="B7">
<label>7.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ma</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Alam</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Sridhar</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Duong</surname>
<given-names>VN</given-names>
</name>
</person-group>. <article-title>Airway Network Management Using Braess&#x27;s Paradox</article-title>. <source>Transportation Res C Emerging Tech</source> (<year>2019</year>) <volume>105</volume>:<fpage>565</fpage>&#x2013;<lpage>79</lpage>. <pub-id pub-id-type="doi">10.1016/j.trc.2019.06.014</pub-id> </citation>
</ref>
<ref id="B8">
<label>8.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Continuous Phase Transition of K-Partite Networks</article-title>. <source>IEEE Syst J</source> (<year>2020</year>) <volume>2020</volume>:<fpage>2990663</fpage>. <pub-id pub-id-type="doi">10.1109/JSYST.2020.2990663</pub-id> </citation>
</ref>
<ref id="B9">
<label>9.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Deng</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Yuan</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>Q</given-names>
</name>
<etal/>
</person-group> <article-title>How to Optimize the Supply and Allocation of Medical Emergency Resources during Public Health Emergencies</article-title>. <source>Front Phys</source> (<year>2020</year>) <volume>8</volume>:<fpage>1</fpage>. <pub-id pub-id-type="doi">10.3389/fphy.2020.00383</pub-id> </citation>
</ref>
<ref id="B10">
<label>10.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bianconi</surname>
<given-names>G</given-names>
</name>
</person-group>. <article-title>Dangerous Liaisons?</article-title> <source>Nat Phys</source> (<year>2014</year>) <volume>10</volume>:<fpage>712</fpage>&#x2013;<lpage>4</lpage>. <pub-id pub-id-type="doi">10.1038/nphys3097</pub-id> </citation>
</ref>
<ref id="B11">
<label>11.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gong</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Jiao</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Enhancing Robustness of Coupled Networks under Targeted Recoveries</article-title>. <source>Sci Rep</source> (<year>2015</year>) <volume>5</volume>:<fpage>8439</fpage>. <pub-id pub-id-type="doi">10.1038/srep08439</pub-id> </citation>
</ref>
<ref id="B12">
<label>12.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Robustness of Multipartite Networks in Face of Random Node Failure</article-title>. <source>Chaos, Solitons &#x26; Fractals</source> (<year>2019</year>) <volume>121</volume>:<fpage>149</fpage>&#x2013;<lpage>59</lpage>. <pub-id pub-id-type="doi">10.1016/j.chaos.2019.01.036</pub-id> </citation>
</ref>
<ref id="B13">
<label>13.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Newman</surname>
<given-names>MEJ</given-names>
</name>
<name>
<surname>Barab&#xe1;si</surname>
<given-names>A-L</given-names>
</name>
<name>
<surname>Watts</surname>
<given-names>DJ</given-names>
</name>
</person-group>. <source>The Structure and Dynamics of Networks</source>. <publisher-name>Princeton University Press</publisher-name> (<year>2011</year>).</citation>
</ref>
<ref id="B14">
<label>14.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ichinose</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Tsuchiya</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Watanabe</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Robustness of Football Passing Networks against Continuous Node and Link Removals</article-title>. <source>Chaos, Solitons &#x26; Fractals</source> (<year>2021</year>) <volume>147</volume>:<fpage>110973</fpage>. <pub-id pub-id-type="doi">10.1016/j.chaos.2021.110973</pub-id> </citation>
</ref>
<ref id="B15">
<label>15.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Feketa</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Bajcinca</surname>
<given-names>N</given-names>
</name>
</person-group>. <article-title>On Robustness of Impulsive Stabilization</article-title>. <source>Automatica</source> (<year>2019</year>) <volume>104</volume>:<fpage>48</fpage>&#x2013;<lpage>56</lpage>. <pub-id pub-id-type="doi">10.1016/j.automatica.2019.02.056</pub-id> </citation>
</ref>
<ref id="B16">
<label>16.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shekhtman</surname>
<given-names>LM</given-names>
</name>
<name>
<surname>Danziger</surname>
<given-names>MM</given-names>
</name>
<name>
<surname>Havlin</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Recent Advances on Failure and Recovery in Networks of Networks</article-title>. <source>Chaos, Solitons &#x26; Fractals</source> (<year>2016</year>) <volume>90</volume>:<fpage>28</fpage>&#x2013;<lpage>36</lpage>. <pub-id pub-id-type="doi">10.1016/j.chaos.2016.02.002</pub-id> </citation>
</ref>
<ref id="B17">
<label>17.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shang</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Localized Recovery of Complex Networks against Failure</article-title>. <source>Sci Rep</source> (<year>2016</year>) <volume>6</volume>:<fpage>30521</fpage>. <pub-id pub-id-type="doi">10.1038/srep30521</pub-id> </citation>
</ref>
<ref id="B18">
<label>18.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chattopadhyay</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Dai</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Eun</surname>
<given-names>DY</given-names>
</name>
<name>
<surname>Hosseinalipour</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Designing Optimal Interlink Patterns to Maximize Robustness of Interdependent Networks against Cascading Failures</article-title>. <source>IEEE Trans Commun</source> (<year>2017</year>) <volume>65</volume>:<fpage>3847</fpage>&#x2013;<lpage>62</lpage>. <pub-id pub-id-type="doi">10.1109/tcomm.2017.2709302</pub-id> </citation>
</ref>
<ref id="B19">
<label>19.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kong</surname>
<given-names>LW</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>RR</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>BH</given-names>
</name>
</person-group>. <article-title>Percolation on Networks with Weak and Heterogeneous Dependency</article-title>. <source>Phys Rev E</source> (<year>2017</year>) <volume>95</volume>:<fpage>032301</fpage>. <pub-id pub-id-type="doi">10.1103/PhysRevE.95.032301</pub-id> </citation>
</ref>
<ref id="B20">
<label>20.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cai</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Gong</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Tian</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>A Survey on Network Community Detection Based on Evolutionary Computation</article-title>. <source>Ijbic</source> (<year>2016</year>) <volume>8</volume>:<fpage>84</fpage>&#x2013;<lpage>98</lpage>. <pub-id pub-id-type="doi">10.1504/ijbic.2016.076329</pub-id> </citation>
</ref>
<ref id="B21">
<label>21.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cai</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>The Robustness of Ecosystems to the Species Loss of Community</article-title>. <source>Sci Rep</source> (<year>2016</year>) <volume>6</volume>:<fpage>35904</fpage>. <pub-id pub-id-type="doi">10.1038/srep35904</pub-id> </citation>
</ref>
<ref id="B22">
<label>22.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Louzada</surname>
<given-names>VHP</given-names>
</name>
<name>
<surname>Daolio</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Herrmann</surname>
<given-names>HJ</given-names>
</name>
<name>
<surname>Tomassini</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Smart Rewiring for Network Robustness</article-title>. <source>J&#x20;Complex networks</source> (<year>2013</year>) <volume>1</volume>:<fpage>150</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1093/comnet/cnt010</pub-id> </citation>
</ref>
<ref id="B23">
<label>23.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dunn</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Wilkinson</surname>
<given-names>SM</given-names>
</name>
</person-group>. <article-title>Increasing the Resilience of Air Traffic Networks Using a Network Graph Theory Approach</article-title>. <source>Transportation Res E: Logistics Transportation Rev</source> (<year>2016</year>) <volume>90</volume>:<fpage>39</fpage>&#x2013;<lpage>50</lpage>. <pub-id pub-id-type="doi">10.1016/j.tre.2015.09.011</pub-id> </citation>
</ref>
<ref id="B24">
<label>24.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wuellner</surname>
<given-names>DR</given-names>
</name>
<name>
<surname>Roy</surname>
<given-names>S</given-names>
</name>
<name>
<surname>D&#x27;Souza</surname>
<given-names>RM</given-names>
</name>
</person-group>. <article-title>Resilience and Rewiring of the&#x20;Passenger Airline Networks in the United&#x20;States</article-title>. <source>Phys Rev E Stat Nonlin Soft Matter Phys</source> (<year>2010</year>) <volume>82</volume>:<fpage>056101</fpage>. <pub-id pub-id-type="doi">10.1103/PhysRevE.82.056101</pub-id> </citation>
</ref>
<ref id="B25">
<label>25.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>&#x10c;repin&#x161;ek</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>S-H</given-names>
</name>
<name>
<surname>Mernik</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Exploration and Exploitation in Evolutionary Algorithms: a Survey</article-title>. <source>ACM Comput Surv (Csur)</source> (<year>2013</year>) <volume>45</volume>:<fpage>35</fpage>. <pub-id pub-id-type="doi">10.1145/2480741.2480752</pub-id> </citation>
</ref>
<ref id="B26">
<label>26.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Trivedi</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Srinivasan</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Sanyal</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Ghosh</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>A Survey of Multiobjective Evolutionary Algorithms Based on Decomposition</article-title>. <source>IEEE Trans Evol Comput</source> (<year>2017</year>) <volume>21</volume>:<fpage>440</fpage>&#x2013;<lpage>62</lpage>. <pub-id pub-id-type="doi">10.1109/ACCESS.2020.2973670</pub-id> </citation>
</ref>
<ref id="B27">
<label>27.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cai</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Gong</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Ruan</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Miao</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Du</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>Network Structural Balance&#x20;Based on Evolutionary Multiobjective Optimization: A Two-step Approach</article-title>.&#x20;<source>IEEE Trans Evol Computat</source> (<year>2015</year>) <volume>19</volume>:<fpage>903</fpage>&#x2013;<lpage>16</lpage>. <pub-id pub-id-type="doi">10.1109/tevc.2015.2424081</pub-id> </citation>
</ref>
<ref id="B28">
<label>28.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>van den Bergh</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Engelbrecht</surname>
<given-names>AP</given-names>
</name>
</person-group>. <article-title>A Cooperative Approach to Particle Swarm Optimization</article-title>. <source>IEEE Trans Evol Computat</source> (<year>2004</year>) <volume>8</volume>:<fpage>225</fpage>&#x2013;<lpage>39</lpage>. <pub-id pub-id-type="doi">10.1109/tevc.2004.826069</pub-id> </citation>
</ref>
<ref id="B29">
<label>29.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Coello</surname>
<given-names>CAC</given-names>
</name>
<name>
<surname>Pulido</surname>
<given-names>GT</given-names>
</name>
<name>
<surname>Lechuga</surname>
<given-names>MS</given-names>
</name>
</person-group>. <article-title>Handling Multiple Objectives with Particle Swarm Optimization</article-title>. <source>IEEE Trans Evol Computat</source> (<year>2004</year>) <volume>8</volume>:<fpage>256</fpage>&#x2013;<lpage>79</lpage>. <pub-id pub-id-type="doi">10.1109/tevc.2004.826067</pub-id> </citation>
</ref>
<ref id="B30">
<label>30.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xu</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>An Optimization Approach for Deriving Upper and Lower Bounds of Transportation Network Vulnerability under Simultaneous Disruptions of Multiple Links</article-title>. <source>Transportation Res Part C: Emerging Tech</source> (<year>2018</year>) <volume>94</volume>:<fpage>338</fpage>&#x2013;<lpage>53</lpage>. <pub-id pub-id-type="doi">10.1016/j.trc.2017.08.015</pub-id> </citation>
</ref>
<ref id="B31">
<label>31.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wu</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Barahona</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Tan</surname>
<given-names>Y-J</given-names>
</name>
<name>
<surname>Deng</surname>
<given-names>H-Z</given-names>
</name>
</person-group>. <article-title>Spectral Measure of Structural Robustness in Complex Networks</article-title>. <source>IEEE Trans Syst Man Cybern A</source> (<year>2011</year>) <volume>41</volume>:<fpage>1244</fpage>&#x2013;<lpage>52</lpage>. <pub-id pub-id-type="doi">10.1109/tsmca.2011.2116117</pub-id> </citation>
</ref>
<ref id="B32">
<label>32.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Mitchell</surname>
<given-names>M</given-names>
</name>
</person-group>. <source>An Introduction to Genetic Algorithms</source>. <publisher-name>MIT Press</publisher-name> (<year>1998</year>).</citation>
</ref>
<ref id="B33">
<label>33.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Kennedy</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Eberhart</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>A Discrete Binary Version of the Particle Swarm Algorithm</article-title>. In: <source>Proceedings of 1997 IEEE International Conference on Systems, Man, and Cybernetics</source>. <publisher-name>IEEE</publisher-name> (<year>1997</year>). p. <fpage>4104</fpage>&#x2013;<lpage>8</lpage>. </citation>
</ref>
<ref id="B34">
<label>34.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Deb</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Pratap</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Agarwal</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Meyarivan</surname>
<given-names>T</given-names>
</name>
</person-group>. <article-title>A Fast and Elitist Multiobjective Genetic Algorithm: NSGA-II.</article-title>. <source>IEEE Trans Evol Computat</source> (<year>2002</year>) <volume>6</volume>:<fpage>182</fpage>&#x2013;<lpage>97</lpage>. <pub-id pub-id-type="doi">10.1109/4235.996017</pub-id> </citation>
</ref>
<ref id="B35">
<label>35.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Mohankrishna</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Maheshwari</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Satyanarayana</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Satapathy</surname>
<given-names>SC</given-names>
</name>
</person-group>. <article-title>A Comprehensive Study of Particle Swarm Based Multi-Objective Optimization</article-title>. In: <source>Proceedings of the 2012 International Conference on Information Systems Design and Intelligent Applications</source> (<year>2012</year>) p. <fpage>689</fpage>&#x2013;<lpage>701</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-642-27443-5_79</pub-id> </citation>
</ref>
<ref id="B36">
<label>36.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>MOEA/D: A Multiobjective Evolutionary Algorithm Based on Decomposition</article-title>. <source>IEEE Trans Evol Computat</source> (<year>2007</year>) <volume>11</volume>:<fpage>712</fpage>&#x2013;<lpage>31</lpage>. <pub-id pub-id-type="doi">10.1109/tevc.2007.892759</pub-id> </citation>
</ref>
<ref id="B37">
<label>37.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bassler</surname>
<given-names>KE</given-names>
</name>
<name>
<surname>Genio</surname>
<given-names>CID</given-names>
</name>
<name>
<surname>Mikl&#xf3;s</surname>
<given-names>I</given-names>
</name>
<name>
<surname>Toroczkai</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Toroczkai</surname>
<given-names>Z</given-names>
</name>
</person-group>. <article-title>Exact Sampling of Graphs with Prescribed Degree Correlations</article-title>. <source>New J&#x20;Phys</source> (<year>2015</year>) <volume>17</volume>:<fpage>083052</fpage>. <pub-id pub-id-type="doi">10.1088/1367-2630/17/8/083052</pub-id> </citation>
</ref>
</ref-list>
</back>
</article>