Professional Documents
Culture Documents
Matrices and Graphs. Theory and Applications To Economics
Matrices and Graphs. Theory and Applications To Economics
Sergio Camiz
Dipartimento di Matematica "Guido Castelnuovo"
Universita di Roma "La Sapienza", Italy
Silvana Stefani
Dipartimento Metodi Quantitativi
Universita di Brescia, Italy
b World Scientific
II Singapore· New Jersey· London· Hong Kong
'
Published by
For photocopying of material in this volume, please pay a copying fee through the Copyright
Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA. In this case permission to
photocopy is not required from the publisher.
ISBN 981-02-3038-9
FOREWORD
the editors
The idea to publish this book was born during the conference « Matrices
and Graphs: Computational Problems and Economic Applications» held in
the far June 1993 at Brescia University. The conference was such a success that
the organizers, actually the present editors themselves, after a short talk with
the lecturers, decided on the spot to apply to the Italian Consiglio Nazionale
delle Ricerche (CNR) for a contribution to publish the conference proceedings.
The second editor did and the contribution came after a while.
In the meantime the editors organized another conference on «Matrices
and Graphs: Theory and Economic Applications», held as the previous in
Brescia during June 1995, partly with different invited lecturers. The confer-
ence was a success again and therefore the first editor applied to the Italian
National Research Council and got a second contribution, that came only re-
cently.
While the lecturers of the first conference, who were not at the second one,
were a bit upset, having submitted their paper without seeing any proceedings
published at that time, the lecturers common to the first and the second con-
ference suggested to join the contributions and publish a unique book for both
conferences. This is what we did.
During all these years, both authors were very busy lecturing, researching,
publishing, raising more funds to make their research possible. Most papers
arrived late and were carefully read by the editors, then the search of suitable
referees was not easy, so that the reviewing process took also a while, some
papers being sent back to the authors for corrections and then submitted again
to referees. A complete re-editing was necessary in order to get the uniform
editor's style ... , well, these are the reasons of such a delay, but eventually here
we are.
The book reflects our scientific research background: for academic and sci-
entific reasons both of us were drawn to different research subjects, both shift-
ing from pure to applied mathematics and statistics, with particular attention
to data analysis in many different fields the first editor, and to operational
research and mathematical finance the second. So, in each of the steps of this
long way, we collected a bit of knowledge.
The fact that in most of investigations we dealt with matrices and graphs
suggested us to investigate in how many different situations they may be used.
vi
This was the reason that led to the conferences; as a result, this book looks
like a patchwork, as it is composed of different aspects: we submit it to the
readers, hoping that it will be appreciated, as we did.
In fact, the numerous contributions come from pure and applied math-
ematics, operations research, statistics, econometrics. Roughly speaking, we
can divide the contributions by areas: Graphs and Matrices, from theoretical
results to numerical analysis, Graphs and Econometrics, Graphs and Theoret-
ical and Applied Statistics.
Graphs and Matrices contributions begin with John Maybee: in his pa-
per New Insights on the Sign Stability Theorem, he finds a new characterization
of a sign stable matrix, based on some properties of the eigenvectors associ-
ated to a sign semi-stable matrix. Szolt Thza in Lower Bounds for a Class
of Depth- Two Switching Circuits obtains a lower bound for a certain class of
(0,1) matrices. It is interesting to note that the problem can be formulated
in terms of a semicomplete digraph D, if one wants to determine the smallest
sum of the number of vertices in complete bipartite digraphs, whose union is
the digraph D itself. Tiziana Calamoneri and Rossella Petreschi's Cubic
Graphs as Model of Real Systems is a survey on cubic graphs, i.e. regular
graphs of degree three, and at most cubic graphs, i.e. graphs with maximum
degree three and show a few applications in probability, military problems, and
financial networks. Silvana Stefani and Anna Torriero in Spectral Proper-
ties of Matrices and Graphs describe from one hand how to deduce properties
of graphs through the spectral structure of the associated matrices and on the
other how to get information on the spectral structure of a matrix through
associated graphs. New results are obtained towards the characterization of
real spectrum matrices, based on the properties of the associated digraphs.
Guido Ceccarossi in Irreducible Matrices and Primitivity Index obtains a
new upper bound for the primitivity index of a matrix through graph theory
and extends this concept to the class of periodic matrices. Sergio Camiz and
Yanda Thlli in Computing Eigenvalues and Eigenvectors of a Symmetric Ma-
trix: a Comparison of Algorithms compare Divide et Impera, a new numerical
method for computing eigenvalues and eigenvectors of a symmetric matrix, to
more classical procedures. Divide et Impera is used to integrate those proce-
dures based on similarity transformations at the step in which the eigensystem
of a tridiagonal matrix has to be computed.
After this review, it should be clear how important is the role of matrices
and graphs and their mutual relations, in theoretical and applied disciplines.
We hope that this book will give a contribution to this understanding.
We thank all the authors for their patience in revising their work. A
special thanks goes to Anna Torriero and Guido Ceccarossi for their constant
help, but especially we would like to thank Yanda Tulli, who did the complete
editing trying to (and succeeding in) making order among the many versions
of the papers we got during the revision process. Last, but not least, thanks
to Mrs. Chionh of World Scientific Publishers in Singapore, whom we do not
know personally, but whose efficieny we had the opportunity to know through
E-mail.
October, 1996.
Sergio Camiz and Silvana Stefani
Typeset by Jj.TEX
Edited by Vanda Tulli
x
AUTHORS ADDRESSES
Contents
J. MAYBEE
Progmm in Applied Mathematics
University of Colomdo
1 Introduction
2. Matrix A satisfies
Theorem 4 The real matrix A is sign stable if and only if the following four
conditions are satisfied.
(iii) every product of the form ai(1)i(2)' ai(2)i(3) ... ai(k)i(l) = 0 for k 2: 3
where {i(l), i(2), ... ,i(k)} is a set of distinct integers in N = {I, 2, ... ,n}
Suppose first that the matrix A is sign semi-stable. The fact that (i),(ii),
(iii), are then true follows by a familiar continuity argument which we omit.
Hence (1) ::::} (2). Given that (2) is true and A is irreducible it follows that,
if aij :f 0 then aji :f 0 also. For suppose aij :f 0 and aji = O. Since there
is a path from j to i in A, (iii) is violated. Thus A is combinatorially sym-
metric. But then G(A), the graph of A exists, is connected and has no cy-
cles. Hence G(A) is a tree. Then by a theorem of Parter and Youngs (1962),
there exists a positive diagonal matrix D such that DAD- 1 = Ad + S where
Ad = diag[all' a22, ... , ann], S = [Sij], with Sii = 0 for i = 1,2, ... , n, and
Sij = -Sji for all i :f j. Thus (2) ::::} (3). Now set A = DAD-l and sup-
pose Au = AU. Taking scalar products on the right and left with U yields
u·Au = U· Adu+u· Su = U· AU = ~lul2 and Au·u = Adu·u+Su·u = Alul 2.
We have U· AdU = Adu· u and U· Su = -Su· u. Hence 2Adu· u = (A + ~)luI2
so we obtain
Re(A) = AI~~ u (1)
U satisfies Re()..) < 0 so A is sign stable. Hence the interesting case for sign
stability is 1 :5 1101 < n, which we assume to hold henceforth.
Let A be a sign semi-stable matrix. By conditions (i) and (ii) every term in
the expansion of det A has the same sign. Therefore if det A = 0, it must
be combinatorially equal to zero and hence every matrix in Q(A) also has
determinant equal to zero. It follows that (1') implies (2'). Our task is to
discover when there exists a non-zero vector U such that Au = O. Now U must
vanish on the (nonempty) set 10 so we partition the components of a candidate
vector U initially into the sets Z(Io), N(Io) where Z(Io) = {i liE I o}, Ui = 0
if i E Z(Io), and Ui =J 0 if i E N(Io). Now given a set Ip ;2 10 and a partition
of the components of U such that Ui = 0 if i E Z(Ip) and Ui =J 0 if i E N(Ip).
We look at the equations
L SijUj = 0 (2)
jEN{I,,)
If such an equation has exactly one nonzero term, it has the form SikUk = 0
for some fixed value of k. Since Sik =J 0 and k E N(Ip), this is a contradiction.
Hence we must place k E I p +1 ' We do this for each such occurrence. Thus
IpH ;2 Ip and Z(Ip) ~ Z(Ip+l) , N(Ip) ;2 N(IpH)' If the system (2) contains
no equation having only a single non-zero term, then IpH = Ip and Z(IpH) =
Z(Ip) , N(Ip+l) = N(Ip). We will examine this case below. Suppose that
Ip+l = N. Then Z(IpH) = Nand u=O, i.e. no matrix in Q(A) has zero as
an eigenvalue. It remains to consider the case where we have some Ip = IpH
with IIpl < n so Ui = 0 for i E Z(Ip) and Ui =J 0 for i E N(Ip). Clearly
every equation in system (2) at this point contains either no non-zero terms
or at least two non-zero terms. We have N(Ip) ~ 2 and the induced graph
(N(Ip)) is a forest. We claim that this forest consists of isolated single trees, i.e.
S(N(Ip)) = O. For suppose (N(Ip)) has a nontrivial tree To. This tree has a
vertex of degree one and there would then exist an equation in the subsystem
S(N(Ip))u = 0 having exactly one nonzero term, a contradiction. Next let
IN(Ip) I = q and suppose there exists r rows in the subsystem L SijUi =
uEN{Ip)
0, i E Z(Ip), having two or more non-zero entries. We have r ~ 1 so the set
of such rows is nonempty. Let this set be Zo(Ip) and consider the submatrix
S(N(Ip))UZo(Ip). The graph of this submatrix is a forest on the q+r vertices.
If IZo (Ip) I ~ q then the numbers of edges in this forest is at least 2r ~ r + q, a
contradiction. Similarly, there cannot be two directed paths from vertex k to
5
vertex l in the directed graph D(So) where So is the matrix of the subsystem
(2) for i E Zo(Ip). It follows that the subsystem Sou = 0 uniquely determines
one or more eigenvectors U belonging to .A = o. Hence each matrix in Q(A)
has at least one eigenvector U belonging to .A = 0 and vanishing upon the set
Z(Ip) ~ 10. Thus Theorem 2 is proved.
and
L SjkUk = iJLuj,j E N(Ip), (4)
kEN(Ip)
If any equation in the subsystem (3) contains exactly one nonzero term,
we have SjkUk = 0 and, as in the proof of Theorem 2, we adjoin each such k to
Ip. Similarly, if any sum on the left hand side of an equation in the subsystem
(4) contains no nonzero term, we have iJLuj = 0 and this contradiction compels
us to add the index j to Ip. Doing this for every such occurrence produces
the new set IpH ~ Ip and thereby the new partition, Z(IpH), N(IpH). If the
subsystem (3) contains no equation having a single term and the subsystem
(4) contains no empty sums, then Ip+l = Ip. We examine this case below.
Suppose that Ip+l = N. Then Z(IpH ) = Nand U = O. Since every matrix
in Q(A) has the same zero-nonzero pattern, it follows that no matrix in Q(A)
has a purely imaginary nonzero eigenvalue.
It remains to consider the case where we have some Ip = IpH with IIpl < n,
so Ui = 0 for i E Z(Ip) and Ui -=I 0 for i E N(Ip). At this point every equation
in the subsystem (3) has either no nonzero tenns or at least two nonzero terms.
Also the induced subgraph (N(Ip)) is a forest and contains no nontrivial trees,
since every sum in the subsystem (4) contains at least one term. This forest
must contain at least two trees, because if it were a single tree the subsystem
(3) would have an equation containing exactly one nonzero term. Moreover, if
a tree in the forest is adjacent to a vertex j E Z (I p) there must also be another
tree in the forest adjacent to vertex j for the same reason. We must therefore
6
have IN(Ip)1 2:: 4. Let jo be the index of a row in subsystem (3) containing
q 2:: 2 nonzero terms. Then vertex jo in G(A) must be adjacent to q distinct
trees in the forest (N(Ip)).
Now choose a pair of trees in (N(Ip)) adjacent to vertex jo. Set Uk = 0
if k is not a vertex of one of these trees. Let the trees be TI and T2, re-
spectively. Then the submatrices S(TI ) and S(T2) are disjoint nonzero skew
symmetric submatrices of S. Hence they have nonzero purely imaginary eigen-
values iJ.LI and iJ.L2. Let VI and V2 be nonzero vectors satisfying S(TI)VI =
iJ.LI VI, S(T2)V2 = iJ.L2v2. Then any vectors aVI and f3v2 also satisfy these equa-
tions where a and f3 are nonzero constants. If J.LI = J.L2 then we choose a and
f3 to satisfy
where kl is a vertex in one tree and k2 is a vertex in the other. Thus aVI and
f3v2 determine a vector u such that Au = iJ.LI u with U q-orthogonal to Ad. If
J.LI #- J.L2 then choose ao such that aoJ.L2 = J.L2 and modify S by multiplying
S(T2) by ao to obtain S'(T2). The resulting matrix is in Q(A) and has iJ.LI as
an eigenvalue.
This proves that some matrix in Q(A) has an eigenvector q-orthogonal
to Ad and it belongs to a purely imaginary eigenvalue. Hence Theorem 3 is
proved.
References
Z. TUZA
Computer and Automation Institute
Hungarian Academy of Sciences
the j-th column is in Ok for some k ~ l), then L (IRkl + lOkI) ~ mlog2 m.
k=l
1 The problem
• Suppose that the square matrix M = (aij) E {o,l}mxm has zero diag-
onal, and at least one of aij and aji is 1 for all i f. j, 1 :::; i, j :::; m.
Minimize the total number of rows and columns in a collection of 1-cells
(submatrices with no 0 entry) such that each aij = 1 occurs in at least
one of those I-cells.
The equivalence of the matrix problem and the two types of graph the-
oretical formulations is established by the corresponding adjacency matrices:
In the bipartite case we define aij := 1 if and only if Xi is adjacent to Yj; or,
conversely, we join Xi to Yj if and only if aij = 1. For digraphs, the entry
aij = 1 of the matrix corresponds to the edge oriented from vertex i to vertex
j.
To see that the switching circuits also give an equivalent formulation, no-
tice first that each link involved in a path of length 2 verifying Cij = 1 for some
pair i,j either starts from an input node or ends in an output node. Now, each
internal node Zk of a length-2 path connects a set Xk of inputs with a set Yk
of outputs, and the number of links incident to Zk is IXkl + IYkl. Therefore,
X k x Yk must be a I-cell in the 0-1 matrix (Cij). Conversely, each I-cell R xC
of r rows and c columns in a 0-1 matrix M can be represented by an internal
node Z connected to r input nodes and c output nodes in the circuit to be
constructed.
Notation
We denote R xC := {aij I ri E R, Cj E C}, where R ~ {r}, ... ,rm } is a
set of rows and C ~ {CI,"" em} is a set of columns. (We may also view
the 0-1 matrices as subsets of {rl,' .. , rm} X {c}, ... , em}.) The shorthand
l
U (Rk x Ck) = M means that the entry aij has value 1 in M if and only if
k=l
ri E Rk and Cj E C k for some k, 1 ::; k ::; i (and aij = 0 otherwise). The
complexity, IT(M), of M is defined as
Obviously, the definition of u(M) can be extended for arbitrary (not nec-
essarily square) 0-1 matrices, but in this paper we do not consider the more
general case; i.e., M E {O, 1}mxm will be assumed throughout.
2 The results
cm2
u(M) < logm
holds for every (m x m) matrix M, for some constant c, and also that this
upper bound is best possible apart from the actual value of c. For some re-
stricted classes of matrices, however, the complexity can be much smaller. This
is the case, for example, in the following two particular sequences, as proved
by Tarjan (1975).
u(M) = n . 2n = m log2 m .
/2
Theorem 2 If m = (L n J)' where LxJ is the lower integer part of x, i. e. the
largest integer not exceeding x, and M = (aij) is the matrix J - I with aii = 0
and aij = 1 for all i =I- j, 1::; i,j ::; m, then
Our main goal is to show that the lower bound of m log2 m in Theorem 1 is
valid for a much larger class of (m x m) matrices. Namely, we will prove the
following result:
Theorem 3 If an (m xm) matrix M = (aij) (aij E {O, I}) has zero diagonal
and aij + aji > 0 for all i =f:. j, then
The subject of this section is to prove Theorem 3, i.e., that a(M) 2: m log2 m
holds for all matrices M = (aij) of order m with zero diagonal, containing at
least one nonzero entry in each {aij, aji}, i =f j.
Suppose that an optimal collection of all-l submatrices Rk x Ck C M
e e
has been chosen, U(Rk x Ck) = M, L (IRk I + ICkl) = a(M). Let X =
k=l i=l
{XI, ... , xl'l, and let us define the following two sets for i = 1,2, ... , m:
Ai .- {xklriERk},
Bi .- {Xk I Ci E Ck}.
Notice that the ordered pairs (i,j) with Ai n B j =f 0 correspond to precisely
those entries aij of M which occur in at least one Rk x Ck, therefore the
e .
assumption U(Rk x Ck) = M and the initial conditions on M imply that
k=l
Variants of this inequality have been considered in several papers; see Katona
and Szemeredi (1967), Tarjan (1975), Alspach et al. (1975) and Pedes (1984)
for its more particular versions, and Tuza (1989), Caro and Tuza (1991) for
generalizations. The various applications of these inequalities - and also those
of further similar types of set-pair collections - are discussed in the two-part
survey (Tuza, 1994, 1995).
In order to make the present proof self-contained, we describe a short
argument verifying (I) in the way as has been done in Tuza (1994). Let us
choose a subset Y = Y (p) ~ {Xl, ... , Xl} at random, by the rule
Prob{xk E Y) = p,
where the choice for Xk is done independently of those for all the other elements
of X. For i = 1,2, ... , m, denote by Ei the event
The condition (i) implies that the events Ei are nonempty. More explicitly, by
the random choice of Y, we have
and
hence
Ai U Aj ~ X \ (Bi U Bj)
would follow. This possibility is excluded by the condition (ii), however, there-
fore
Prob{El ) + ... + Prob{Em ) :::; 1,
12
Finally, row ri (column Ci) occurs in precisely IAil sets Rk (in IBil sets Gk ,
respectively), thus
m l
m· T t7 (M)/m ~ 1,
In this section we prove Theorem 4. The argument will be quite similar for
Mm and M~, therefore we can handle these two classes together.
Instead of counting, we are going to select a matrix M at random from
the corresponding class, and show that
for each pair i,j (1 ~ i < j ~ m) independently, while for M~ the corre-
sponding probabilities are
one further essential fact is that p ~ 1 - 8 holds for some fixed 8 > 0 (in both
probabilistic models).
We claim that, with probability 1-0(1) as m ~ 00, every I-cell RxC c M
satisfies
min {IRI, IGI} < c'logm (5)
for some constant c'. Indeed, denoting m' := c' log m, arbitrarily chosen m'
rows and m' columns generate a I-cell with probability precisely
if they do not induce a diagonal element, because the presence of two dependent
entries {aij, aji} C R x C would also yield {au, ajj} C R xC. Moreover, the
probability to get a I-cell R x C is zero if a diagonal element is included. On
the other hand, the number of m' x m' submatrices is
therefore the probability that some of those submatrices contains no zero entry
is less than
Choosing c' := 2/ log (I/p), this probability will tend to zero, since m' -+ 00
as m -+ 00. Thus, all (m' x m') submatrices of M contain at least one zero
entry, with probability 1 - 0(1).
l
Assume now U(Rk x Gk ) = M, and suppose that this is an optimal
k=l
l
choice of I-cells, i.e., 2:: (IRkl + IGkl) = O"(M). For each ordered pair (i,j) E
k=l
m x m with aij = 1, choose a cell Rk x G k containing aij, and define
1 1
Cij := IRkl + IGkl .
k=l
= O"(M).
On the other hand, applying (5) for the I-cell Rk x G k containing aij (the
I-cell that has been chosen in the definition of Cij), we obtain that
m(m -1)
> 2c'logm
15
Finally, we discuss the tightness of the results proved above, and mention some
related questions which remain open.
(6)
by an explicit construction. A simple alternative way to prove (6) is to consider
the following recursive procedure. Clearly, for n = 1, {rl} x {C2} is the subma-
trix required to decompose T I . For n ~ 2, we can take RI := {r}, ... , r m /2}
and G I := {Cm/HI,"" Cm}, i.e., the I-cell generated by the first 2n - 1 rows
and the last 2n - 1 columns. Then IRII + IGII = m = 2n , and if we remove
those 4n- 1 (nonzero) entries of RI x GI from Tn, the remaining nonzeros form
two triangle matrices isomorphic to Tn-I, which then can be decomposed
separately, by induction.
Consequently, denoting by s(n) the total number of rows and columns in the
collection of I-cells obtained recursively, we conclude
s(n) = 2s(n - 1) + 2n ,
Prob(aij = 1) = p.
Here we allow that p = p(m) may depend on m. The argument given in Section
4 shows that
cm 2
a(M) ~--
logm
holds for an appropriately chosen constant c > 0 with probability 1 - 0(1) as
m -+ 00, provided that p(m) ::; 1 - {j (for an arbitrarily fixed {j > 0, and for all
sufficiently large m ~ mo).
On the other hand, according to Theorem 2, for p = 1 we have
a(M) = (1+o(1))mlog2m.
Hence, writing p in the form p( m) = 1 - q( m), the speed of the convergence of
q( m) to zero determines the expected asymptotic value,
of the complexity of M. The current methods are not strong enough to describe
the exact relationship between q(m) and a(m), and we do not even know how
quickly q(m) must approach 0 to ensure a(M) = O(mlogm).
Note that a(m,p) is small also in the case where p(m) itself tends to zero
at a sufficiently large speed. From this point of view it would be interesting
to see which pairs of small and large probabilities (tending to 0 and to 1,
respectively) yield the same asymptotics for the expected value of a(M).
17
Acknowledgments
The research was supported in part by the OTKA Research Fund, grant
no. 7558.
References
Alspach, B., L.T. OHmann and K.B. Reid, 1975. «Mutually disjoint
families of 0-1 sequences» Discrete Math., 12: p. 205-209.
Caro, Y. and Z. Tuza ,1991. «Hypergraph coverings and local colorings»
J. Combinatorial Theory Ser., B 52: p. 79-85.
Katona, G.O.H. and E. Szemeredi , 1967. «On a problem of graph
theory» Studia Sci. Math. Hungar., 2: p. 23-28.
Perles, M.A ., 1984. «At most 2d +1 neighborly simplices in Ed » Annals
of Discrete Math., 20: p. 253-254.
Tarjan, T .G. , 1975. «Complexity of lattice-configurations» Studia Sci.
Math. Hungar., 10: p. 203-211.
Tuza, Z. , 1984. «Covering of graphs by complete bipartite subgraphsj com-
plexity of 0-1 matrices» Combinatorica,4: p. 111-116.
Tuza, Z. , 1987. «Inequalities for two set systems with prescribed inter-
sections» Graphs and Combinatorics, 3: p. 75-80.
Tuza, Z. , 1989. «Intersection properties and extremal problems for set
systems» In G. Halasz and V.T. Sos (eds.), Irregularities of Partitions,
Algoritheorems and Combinatorics Vol. 8, Springer-Verlag, p: 141-151.
18
T. CALAMONERl, R. PETRESCHI
Dipartimento di Scienze dell'InJormazione
Universitd di Roma "La Sapienza"
In this paper we deal with cubic graphs, i.e. regular graphs of degree 3, and with
at most cubic graphs, i.e. graphs with maximum degree 3. We recall two basic
transfurmation techniques that are used to generate these graphs starting from a
smaller graph, either cubic or general. Moreover we show some applications. To
complete this brief survey we present the state of the art of a specific problem on
these graphs: their orthogonal drawing.
1 Introduction
Any system consisting of discrete states or sites and connections between, can
be modelled by a graph. This fact justifies that they are a natural model for
many problems arising from different fields.
For instance, the psychologist Lewin proposed (Lewin, 1936) that the life
space of a person can be modelled by a planar graph, in which the faces rep-
resent the different environments.
In probability, a Markov chain is a graph in which events are vertices and
a positive probability of direct succession of two events is an edge connecting
the corresponding vertices (Hoel et al., 1972).
Military problems like mining operations or destruction of targets may be
led to the maximum weight closure problem (Ahuja et al., 1993).
Different processes such as manufacturing, currency exchanges, translation
of human resources into job requirements find as natural models networks, i.e.
directed weighted graphs (Evans and Minieka, 1992).
This interpretation is also applied to financial networks, in which nodes
represent various equities such as stock, current deposits, certificates of deposit
and so on, and arcs represent various investment alternatives that convert one
type of equity into another.
The search of the solution of problems in so different fields justifies the
existence of many types of graphs and many basic notions that capture as-
pects of the structure of graphs. Moreover, many applications require efficient
algorithms that operate above all on graphs.
In this paper we deal with cubic graphs, i.e. regular graphs of degree 3,
and with at most cubic graphs, i.e. graphs with maximum degree 3. We recall
two basic transformation techniques that are used to generate these graphs
starting from a smaller graph, either cubic or general. Moreover we show some
20
applications. To complete this brief survey we present the state of the art of a
specific problem on these graphs: their orthogonal drawing.
In all this paper we use the standard graph theoretical terminology of
Hartsfield and Ringel (1994).
2 Cubic graphs
The first problem is open for at most cubic graphs (Garey and Jonhson,
1979) while it is polynomially solvable for cubic graphs (Johnson, 1981). The
second problem is proved to be NP-complete by a transformation from vertex
cover for cubic graphs and it remains NP-complete for at most cubic planar
graphs and for at most cubic bipartite graphs (Garey and Jonhson, 1979).
The orthogonal drawing that we present in the last section is an example
in which the more general problem is related to at most cubic graphs. On
the contrary, the regularity of the degree is fundamental when a graph is the
model of an interconnection network, as we show in subsection 3.1.
The first time that cubic graphs appeared in the literature was in an in-
formal manner in Tait (1878) and in a more formal way in Petersen (1891)
dealing with factorizations of graphs and related colourings.
Many specific theoretical results on cubic graphs are known, but they
require a background that is not possible to give here. For a deep insight on
this topics, see Ore (1967), Hartsfield and Ringel (1994) and Greenlaw and
Petreschi (1996).
In a cubic graph the number n of vertices is always even and the number
of edges is 3n/2. If the cubic graph is plane, the number of faces is 2 + n/2.
In the following we just recall two basic transformation techniques that
are used to generate cubic (or at most cubic) graphs starting from a smaller
graph, either cubic or general.
The following construction method is due to Johnson (1963) and is based
on the concept of H-expansion. We call H-graph the graph with 6 vertices and
5 edges shown in Figure 2.
Figure 2: H-graph
In Figure 3 the 8-vertex cubic graphs derived from a 6-vertex one is shown,
when edges (V2,V3) and (V4,V5) are removed.
We will present only three different applications that cover different fields and
seem particularly significant.
a cubic graph derived from a hypercube whose all nodes have degree d. To
obtain the eee model, the cubic transformation is applied to the hypercube,
as shown in Figure 5 when d = 3.
hexagons, squares and triangles (Ore, 1967). It is easy to see that hexagons
induce a graph that is cubic except along the border of the external face (Figure
7).
We want to conclude this paper presenting the state of art of a particu-
lar problem related to cubic graphs. In view of the fact that the graphical
representation of a graph is not unique, (see e.g. Figure 8) and that a "good"-
drawing may be either a starting or arriving point of different problems, the
next section will survey orthogonal grid drawing of at most cubic graphs.
References
Tait P. G. , 1878. «On the colouring of maps» Proc. Roy. Soc. Edinb.,
10, p. 501-503.
31
S. STEFANI
Dipartimento M etodi Quantitativi
Faroltd di Economia, Universitd di Brescia
A. TORRIERO
Istituto di Econometria e Matematica per le Decisioni Eronomiche
Universitd Cattolica, Milano
Matrices and graphs are characterized by their spectral properties. Useful infor-
mation on graphs can be desumed by their associated matrices, while, on the other
hand, many interesting results on matrices can be proved by using their associ-
ated graph structure. Through some bounds known for the spectrum of a matrix,
based on its distribution, conditions for connectivity and estimates for some invari-
ant measures of a non oriented graph will be obtained. Furthermore, a class of real
spectrum matrices is investigated throughout the cyclic structure of the associated
graph. Some results on diagonal similarity are applied to provide conditions for a
strongly combinatorially symmetric matrix to have real eigenvalues.
1 Introduction
In this section we recall some basic graph theoretic definitions and some of the
main relationships between graphs and matrices.
A very interesting result is that for any incidence matrix B = B(G), Q(G)
can be factored as Q(G) = BTB. When the graph is weighted, Q(G) =
BTWB, where W is the m x m diagonal matrix of weights (Friedland,1992).
(a) if the graph has no loops or mUltiple edges, then 0 ::; Ai ::; n for each i,
and Al = n iff G, the complement of G, is not connected
Theorem 1 The avemge degree of a gmph is not higher than the largest Lapla-
cian eigenvalue.
n n n
Ld(v) Ld(v)
Proof The average degree is 11=1 n Since 11=1 n = i=h (property
(c)), from the associativity property of the mean we get
n
o
See also Brouwer (1995), for an analogous result valid for the adjacency matrix.
n
Ld(v)
Note that, from property (c), 11=1 n = trhG) , where tr( G) is the trace of
the Laplacian.
The multiplicity of 0 as an eigenvalue of G is related to the graph con-
nectivity: the method we propose here allows to rapidly check for connectiv-
ity without computing the eigenvalues of Q(G) directly, but working on the
trace of Q(G) and of its square Q2(G) only. The bounds we compute for the
spectrum of Q(G) are drawn from the statistical properties of the eigenvalues
distribution, whose /l and a 2 are respectively mean and variance (Wolkowitz
and Styan, 1980; Stefani and Torriero, 1994 and 1995):
(ii)
/l - a i-I. ::;
Vn-z+l Ai ::; /l + a p,-i
- .-
z
for each i = 1, ... , n (2)
36
The interesting fact is that J.l and a are related respectively to the trace of
Q and its square:
n n
L'\
-n - -- -tr(Q)
J-. li=l -n- .'
Using our bounds (2) we get a first approximation of the two invariants:
diam(G);'
n
( f;;)'
J.l+a --1
i(G);' ~ (~- aJn 2 2)
n-
The following examples show how the use of the inequalities above can
improve the bounds for the Laplacian eigenvalues and give substantial infor-
mation on the connectivity of G.
Example 1
1 0 0
~
[ -1 1 -1 0
B = 0 -1 1 W = diag( 4,4.5,6,7.2,3)
-1 0 0 1
-1 0 1 0
37
Id-__~~____________~3
Since '\3 > 0, the graph is connected. The method we propose (equations
(1) and (2)) improves substantially the information for connectivity. Note
again that to get those bounds we only need to compute tr(Q) and tr(Q2).
The spectrum of the weighted Laplacian is:
{15.964, 6.5136, 3.7722, 2.9995 X 1O-6}.
38
Example 2
/ 3
6 4
~ 5
0 1 1 0 0 0 2 0 0 0 0 0
1 0 1 0 0 0 0 2 0 0 0 0
1 1 0 1 0 0 0 0 3 0 0 0
A= 0 0 1 0 1 1
D= 0 0 0 3 0 0
0 0 0 1 0 1 0 0 0 0 2 0
0 0 0 1 1 0 0 0 0 0 0 2
2 -1 -1 0 0 0
-1 2 -1 0 0 0
-1 -1 3 -1 0 0
Q=D-A= 0 0 -1 3 -1 -1
0 0 0 -1 2 -1
0 0 0 -1 -1 2
• A5 :::; 6 by property a)
39
• 0 ~ A5 ~ 2.4 by property e)
Example 3
Consider a graph with two pendant vertices, i.e. vertices that are adjacent to
only one vertex.
3 2
6 5
0 0 1 0 1 0
0 0 1 0 0 0
1 1 0 1 0 0
A= , I) = diag(2,1,3,2,3,1)
0 0 1 0 1 0
1 0 0 1 0 1
0 0 0 0 1 0
40
2 0 -1 0 -1 0
0 1 -1 0 0 0
-1 -1 3 -1 0 0
Q=D-A=
0 0 -1 2 -1 0
-1 0 0 -1 3 -1
0 0 0 0 -1 1
Through (1) we find bounds for the whole spectrum [-1.6515,5.6515] which is
definitely better than [0,6] resulting from (a). In fact, from the former bound
we can conclude that the complement of G is connected.
The spectrum of the Laplacian is:
{4.7321, 3.4142, 2.0, 1.2679, .58579, -9.2539 x lO-IO}.
Example 4
Let us consider the following two different graphs (without loops or multiple
edges) G I and G 2 , taken from Cliff et al. (1979); G 2 describes the Argentinian
airline network for the seven main cities. Al and A2 are the corresponding
adjacency matrices.
2 2
7 3
6 5 4 6 5 4
0 1 1 1 1 1 1 0 1 1 1 1 1 1
1 0 1 1 1 1 1 1 0 1 0 0 1 0
1 1 0 1 1 1 1 1 1 0 0 0 0 1
Al= 1 1 1 0 0 0 0 ,A 2 = 1 0 0 0 1 0 0
1 1 1 0 0 0 0 1 0 0 1 0 0 0
1 1 1 0 0 0 0 1 1 0 0 0 0 0
1 1 1 0 0 0 0 1 0 1 0 0 0 0
6 0 0 0 0 0 0 6 0 0 0 0 0 0
0 6 0 0 0 0 0 0 3 0 0 0 0 0
0 0 6 0 0 0 0 0 0 3 0 0 0 0
D1 = 0 0 0 3 0 0 0 ,D2= 0 0 0 2 0 0 0
0 0 0 0 3 0 0 0 0 0 0 2 0 0
0 0 0 0 0 3 0 0 0 0 0 0 2 0
0 0 0 0 0 0 3 0 0 0 0 0 0 2
We computed the variation coefficient for the two graphs, in order to assess
the departure from completeness of both graphs i.e. which of the two graphs
is more complete than the other.
/11 = 4.2857, 01 = 2.5475, 01/11 = .59442;
/12 = 2.8571, 02 = .88449, ~ = .30958.
Note that ~ > ~ and it is immediate to check that G 1 is more close
to completeness than G2. (in Stefani and Torriero (1995) an analogous mea-
sure is proposed, based on the asymmetry Pearson coefficient of the spectrum
distribution) .
The spectrum of G 1 is:
{7.0, 7.0, 7.0,3.0, 3.0, 3.0,-4.5774 x 1O-10}.
The spectrum of G 2 is:
{7.0, 4.4142, 3.0, 3.0, 1.5858,1.0, -1.4838 x 1O-1O}.
c
Let A, B E nn . A and B are diagonally similar if there exists a nonsin-
gular diagonal matrix D such that A = D- 1 BD.
c
Let A E nn . A is diagonally symmetrizable if it is diagonally similar to a
symmetric matrix.
Obviously a diagonally symmetrizable matrix has real eigenvalues, therefore
such matrices generalize the concept of symmetric matrices.
c
Let A, B E nn . A and Bare c-equivalent if G(A) = G(B) and for each
circuit 'Y of G(A) we have II/A) = I1i (B).
43
(3)
We first observe that G(A) = G(B) and the elements of A belonging to
the circuits are, by definition, necessarily different from zero.
Then we have:
i) sign(aij) = l/sign(aij)
Multiplying each element aij of (3) by sign(aij) and extracting the square
root of both sides, in virtue of ii) and iii), we get:
Jail i2 Jai2i3 ... jaikil = Jail ik jaikik_l ... j a i 2i l ·
Now multiplying both sides of the above equality by
Jail i2 jai2i3 ... Jaikil yields:
ail i2 ai2i3 ... aiki l = Jail ikaiki l Jaiki k _l ai k _ l i k ... J a i 2 i l ail i2
by i), implies IT--y(A) = IT--y(B).
The proof of the sufficient condition is analogous. 0
Theorem 4 Let A = [aij] be a strongly combinatorially symmetric matrix and
let IT)A) = ITTI (A) for each circuit'Y of G(A). Then all eigenvalues of A
are real.
Proof Let B = [bij] = sign(aij)Jaijaji.
By Theorem 2, Lemma 1 and Theorem 3 it follows that A is diagonally similar
to B, whose eigenvalues are real, being B symmetric. Hence the thesis follows.
o
44
to ~ (~).
In the next theorems we prove that it is possible to decrease the number
of circuits to be checked, by only considering either the chordless circuits of
G(A) or the circuits forming a basis in the circuit space Z(G) of dimension
s = m - n + p , being m the size of G(A), n the order of G(A) and p the
number of components.
The first result will appear in Theorem 5 and is based on a characterization
of the diagonal similarity of two matrices A and B in terms of a certain class
of circuits of G(A) given by Engel and Schneider (1980, Theorem 3.5). More
precisely they proved that if A is completely reducible and B is symmetric, then
the matrices A and B are diagonally similar if and only if detA[)'] = detB[)']
where "( is a 1 - or 2-circuit of G(B) or "( is a chordless circuit of G(A).
DetA[),] is the principal minor of A, whose rows and columns are indentified
by the indices in )'.
Finally, Theorem 6 gives a further condition for a strongly combinatorially
symmetric matrix to have real spectrum. From Corollary 2.4 and Remark
5.2 in Saunders and Schneider (1978), it follows, in particular, the diagonal
similarity of A and B = [b ij ] = sign( aij) Jaij aji by checking the condition
I1,),(A) = I1')'(B) for the circuits "( forming a basis in the circuit space Z(G)
only.
First of all we state the following:
n-2
= ainindetA[J] + 2)-I)n+I-2 L detA[K]A(KI)
r=O
where J = (iI, i 2, ... ,in-d, K = (kl' k2' ... ,kp) is the set of increasing sets
of distinct indices in J, K' is the complement to the set K and A(KI) is the
sum of all (n-p)-cycles in A[K']. Finally, Dr,J denotes the set of all increasing
sets J = (jl,'" ,jn)'
Now, taking into account the above remark, it follows that A(KI) is always
equal to zero except for K = (kl' k2, ... , k n -2) or K = (0).
But we also have aini n = binin , aijikaikij = bijikbikij and IT,),(A) =
IT,),(B). Hence, based on the complete induction hypothesis, detA[J] = detB[J]
so that detA[;Y] = detB[;Y]. 0
pressed in Theorem 4.
The following theorem relates real spectrum matrices to the circuit space
of their directed graph.
Theorem 6 Let A be a strongly combinatorially symmetric matrix and let
be a basis for the circuit space ofG(A). If I1')'i (A) = I1')'i- 1 (A),
')'1,')'2, ... ,')'s
i = 1, ... , s, then all eigenvalues of A are real.
Proof: The proof follows easily from Theorem 2, Lemma 1 and from Saun-
ders and Schneider (1978: Corollary 2.4, Remark 5.2). 0
Example 5
0 2 1 0 1 5
6 0 3 0 0 0
4 4 0 10 9 0
A= 0 0 5 0 2 0
4 0 9 4 0 10
6 0 0 0 3 0
1 -1 0 0 0 0
0 1 -1 0 0 0
0 0 1 -1 0 0
0 0 0 1 -1 0
B(G) = 0 0 0 0 1 -1
-1 0 0 0 1 0
-1 0 0 0 0 1
1 0 -1 0 0 0
0 0 1 0 -1 0
47
6 4
Figure 5: Digraph G
Acknowledgments
We thank Guido Ceccarossi and two anonymous referees for useful suggestions.
All errors are our own.
Research supported by MURST 60% 1993 (S.stefani) and MURST 60%
1994 (A.Torriero).
Although the whole paper is attributable to both authors, Silvana Stefani
has written in particular Section 3, Anna Torriero Section 4, Sections 1 and 2
have been jointly written.
References
Fiedler, M. and V. Pta!< , 1969. «Cyclic products and inequality for de-
terminants:» Czechoslovak Math. J., 19: p. 428-450.
G. CECCAROSSI
Dipartimento M etodi Quantitativi
Facoltd di Economia, Universitd di Brescia
The aim of this paper is to highlight the existent relations between the primitivity
index and the class of irreducible matrices. We consider both the subclasses of
irreducible, either primitive and periodic, matrices (the latter well described in
Seneta, 1981), in order to obtain some original results about: lowering the upper
bound for the primitivity index as stated by Berman and Plemmons (1979) or
Seneta (1981) through the application of graph theory and extending the idea to
the subclass of periodic matrices.
1 Preliminary remarks
In this section we remind some useful definitions and theorems about graphs
and non-negative matrices (we assume henceforth that all matrices we speak
about are non-negatives), presenting only proofs explaining the methodology
followed in the paper and omitting others that readers may find in the original
texts (Berman and Plemmons, 1979; Bollobas, 1979; Seneta, 1981; Buckley
and Harary, 1990).
there exists a path joining each pair of nodes; unilaterally connected if for each
pair of nodes, at least one is reachable from the other; otherwise the graph
is disconnected. A component of a graph is a maximal strongly connected
subgraph where maximal means with the maximum number of nodes.
Other two concepts we will use in the following are the eccentricity and the
cut-node. The first one is defined for a node v as the distance from the farthest
node in V(D) as illustrated for a generic (non oriented) graph in figure 1, and
formally written as
e(v) = max {d(u, v) : u E V(D)} (1)
About the second, we define a cut-node as a node whose removal raises the
number of components in a graph, in particular if the graph is strongly con-
nected, the removal of a cut-node disconnects it.
From definitions we can directly state the following theorem about cut-
nodes:
In other words, if for each pair of matrix indices i,j there exists a positive
integer k, function of i, j such that a~j > 0, then the matrix is irreducible. This
statement leads to the following consideration useful for proofing the following
theorem: in the graph associated to an irreducible matrix there exists a walk
joining each pair of nodes i,j (i,j = 1, ... , n where card [V (D (A))] = nand n
is also the order of A) and, by strong connectivity, we can always choose the
path oflength d( i, j) such that d( i, j) = k; moreover, by definition of path, we
have k = d(i,j) ~ nand d(D(A)) ~ n. A particular case is when D (A) is a
unique spanning circuit which implies d(i, i) = n for each i and d(D(A)) = n.
The following theorem, here presented with an original proof based on graph
theory, is the logical sequence of the previous consideration.
Theorem 4 Let i be any index belonging to the index set {I, 2, ... , n} of A.
Then for each other index j there exists a unique integer rj in the interval
o ::; rj ::; p - 1, where p is the period of A, such that:
1. if aij > 0 then s == rj mod p;
2. a~J+rj > 0 for k ~ N(j), where N(j) is some positive integer depending
on j.
This theorem says that the indices can be grouped into p disjoint classes,
called residual, whose elements are reachable between them through walks of
length 1 == rj mod p. The subset of matrix indices, taken from {I, 2, ... , n},
belonging to the same residual class mod p is noted Cr.
The canonical form of an irreducible matrix A is suitably obtained (see
Seneta, 1981) permuting the matrix entries in order to have all those belonging
to the same residual class in adjacent positions and ranking the residual classes
in ascending order. The result will be a matrix like the one below
0 AO,l 0 0 0
0 0 A 1,2 0 0
PAP' = 0 0 0 0 (2)
0 0 0 0 A p- 2,p-l
Ap-1,o 0 0 0 0
where p is the period and Ai,j are matrices in which the set of row indices
corresponds to the subset Ci and the set of column ones to Cj • Such a matrix
may be studied in term of powers of primitive matrices as we can easily show
for the simple case of p = 3. Starting from the canonical form
PAP' ~ [ ~ A~.']
AO,l
0 (3)
A 2,o 0
we have
(PAP')' ~ [ AI.,:A,.O
0
0 AO'f"] (4)
A2,oAo,1
and
[ A..IArA,.o
]
0 0
(PAP,)3 = A 1,2 A 2,oAo,1 0 (5)
0 A 2,oAo,lA 1,2
56
3
The diagonal blocks in (PAP') , and more generally in (PAP'r, are
square and primitive, so as [(PAP')Pt with k positive integer; that is to
say that powers multiples of the period can be studied in term of primitive
matrices.
2 Primitivity index
h
Lemma 1 If A is irreducible of order n, j EN and h ~ n -1, then U Fl(j)
1=0
contains at least h + 1 elements.
Proof (Lemma 2) In this case we give an intuitive and original proof based
on the irreducibility of A. If A is irreducible, d(i,j) ~ n -1. If d(i,j) = n-l
then surely exists a walk from i to j of length n - 1 + k; it is the path of
length n - 1 joined to the closed walk of length k existing by assumption. If
d(i,j) = l < n - 1 then the walk from ito j is formed by the path of length l
joined to the walk of length k - (n - 1 - l) > k existing by assumption. So,
j is reachable from any other index i in n - 1 + k steps and also after s for
all s > n - 1 + k. A particular case is when j has a loop; if this condition is
57
fulfilled then F n- 1 (j) = N. Note that k would be set equal to one but, as by
definition i E F°(j), it may be considered equal to O. 0
Corollary 1 Let A be primitive of order n such that aij > 0 if and only if
aji > O. Then ')'(A) ~ 2(n -1).
h
Lemma 3 If A is irreducible of order n, j E Nand h :-:::; e(j), then U pl(j)
1=0
contains at least h + 1 elements.
Corollary 3 Let A be primitive of order n such that aij > 0 if and only if
aji > O. Then ,(A) :-: :; 2d(D(A)).
A~,I o o
A 2 ,2 o
1..]
Akp= (6)
[ o o
o o o
where the diagonal blocks AI,I, ... , Ap,p are primitive. The aim is to calculate
the first k satisfying AI,I > > O, ... ,Ap,p > > 0 and in the following we will note
it "(' (A) using again the terminology of ''primitivity index "given the similarity
of concepts. In terms of the previous notation, "('(A) is the smallest k for which
Fkp(Cr ) = C r , where C r is an index class.
It seems to be trivial to find an upper bounds for "('(A) because it is
sufficient to apply theorems we stated in the previous section to each Ai,i (i =
1, ... ,p) and observing that. max ,,((Ai,i) ~ "('(A). A more difficult problem is
1.=l, ... ,p
to calculate its exact value and here it is possible given the regularity shown by
graph associated to periodic matrices. In order to solve this problem we need
a detailed analysis of the associated oriented graphs with its features, which
allows us to find algorithms for "('(A) computation. In the first subsection we
introduce some hypothesis on the graph structure of a periodic matrix and
in the others we gradually analyze the problem from the easiest to the more
complex case.
o o
A 2 ,2 o
(7)
o
o o
with AI,I » 0; ... ; Ap,p » 0, that is ,'(A) = 1. (We remark that the equal
sign in equation 7 stems from the application of Boolean algebra to the calculus
of powers of A, since we are interested in checking if entries of A are different
from zero and not in their actual magnitude).
Proof We have to show that, for every choice of an index pair i, j belonging
to the same class, including the case i = j, d(i,j) = p. If i = j, d(i,j) = p by
assumption 1; if i # j, assumption 2 implies that i and j belong to different
circuits and t (the cut-node) is equidistant from all elements of the same class.
Generalizing, let us assume t E Co and i, j E Cr with 1 ::; r ::; p - 1 and note
d(t, C r ) = kp + r the distance between t and a generic element of Cr. Since t
belongs to all circuits, d(t,Cr ) = r and, since the length of each circuit is p,
we have also d(Cn t) = P - r. Joining the two paths we obtain d(Cr , Cr ) = p
~~~ 0
Example 1
1 2 3 4 5 6 7 8 9 10 11 12 13)
( 1 3 7 5 6 12 2 8 10 11 4 9 13
which means that the first row and column are unchanged, the seconds
take the place of thirds, the thirds take the place of sevenths and so on.
Suppose to check what happens in the chain a f-----+ c with respect to the
nodes in C2 , the only class without cut-nodes. From assumption 1, every node
is reachable from itself and at least from another node belonging to the same
class, moreover we know that d( C2 , t) < 4. In more detail, moving from a
to c, for 11 we have d(11,5) = 3 because 5 E Cl ; again d(5,8) = 1, then
p4 (11) = {11, 8}. Going on, P4(8) = C2 because b contains two cut-nodes, 5
and 13, and by d(C2 , t) < 4 the node 8 can reach the nodes of its class in both
a and c. Adding these first results we have F 2*4(11) = p4(p4(11)) = C2 and,
obviously, also F 2*4(8) = C2 • Concerning 2, taking the chain in the other way
c ----+ a, we remark that: d(2,13) = 1 and d(13, 8) = 3 so P4(2) ;2 {2, 8} , but
we have also d(13, 5) = 2 and d(5, 11) = 1 then F4(2) = C2 • We conclude that
2 makes a jump reaching 11 which belongs to the circuit a distant 2 from c
in the chain; this is possible because with a path of length 4 starting from 2
we can reach two different cut-nodes, here 5 and 13. As results, if a jump is
allowed to each node belonging to an extreme circuit, "(' (A) decreases by 1.
In our example, from F 2 *4(C2 ) = C2 , we have "('(A) = 2 (11 cannot make a
jump) as it is easy to verify computing A kp powers and noting that Al,l > > 0,
A 2 ,2 » 0, A 3 ,3 » 0, A 4 ,4 » ° for k 2: 2.
We can now state the following theorem, without proof, and a corollary,
to introduce the more complex cases.
Proof. The worst case is when no nodes can make jumps, but also under these
conditions, for the first three circuits Theorem 12 holds, implying the thesis. 0
64
In order to analyze cases for which -y/(A) < l-1 (at least a jump for each
node in an extreme circuit), at first, we have to consider the cut-nodes positions
and we begin by introducing assumption 3 to discriminate between x's (y's)
values in order to find the interesting ones. We distinguish between h(= p)
even or odd: in the first case x's set is X = {I, 2, ... , ~} because starting from
an extreme of the chain, we say 1, to reach the other, we say l, and finding
x = h - 1 is like starting from 1 to reach 1 with y = 1, for x = ~ it is the
same starting from 1 or from l. In the second case, we have X = {I, 2, ... , h21 }
since, given x and y satisfying x + y = h relative to the chains taken as 1 - - 1
and 1 __ 1, if x = h21 then y = ~, taken x + 1 we would have the same
results but relative to the inverted paths (l __ 1 and 1 - - l). Secondly,
we have just remarked Example 1 that the conditions for a jump are satisfied
differently between nodes belonging to a class but it is most important to note
that it is also true between classes; moreover it will be shown that this depend,
under assumptions 1 and 3, on the position taken by the node identifying the
class in the first circuit, relative to the first cut-node tl' To show it,call node
with its class index r, indexed by the circuit number: that is the notation ri
corresponds to the node belonging to the r-th class in the i-th circuit. The
distance between an rl and the first cut-node is than noted d(rl' td and, by
assumption 1, d(rI, t 1 ) = b :s; h with equality for rl = tl' By assumption 3 we
have, for the other circuits, d(ri' ti) = p where p satisfies:
b + (i -1)x = qh + P (8)
For example, let us investigate the class r such that d(rl' tl) = x (other
classes behave similarly); we know the length of the path joining rl to r2
to be h and this path may be decomposed into two parts which distances
between nodes are d(rl' tl) = x and d(tI, r2) = h - x. Obviously we have
also d(r2' tl) = x and, by assumption 3, d(tl' t2) = x, then d(r2' t2) = 2x =
x + (2 - l)x. The same computations leads to the stated property of d(ri' t i ).
Moreover we consider only the reminder of the division by h because of the
periodicity stemming from assumption 1 which implies that: if we can reach
a node through a path of length p + mh, where m is any positive integer.
The importance arises from the following remark: when in a circuit i # 1
we have d(ri' ti) :s; x, taking the chain in the opposite direction we note that
d(ri+l' ti) = d(ri' ti) :s; x and, using the fact that d(ti' ti-l) = y = h - x, we
have d(ri+l' ti-d :s; h; i.e. the path joining ri+1 to the node ri contains two
cut-nodes, or ri+1 makes a jump. In the following we will more generally say
that a jump is allowed to the class r. The last remark is that the number of
circuits needed to allow a jump to a class r is a non increasing function of
d(rI, tl)'
65
Divisibility of h by x
Our purpose here is to state a general formula to calculate "(' (A) when h is
divisible by x under assumptions 1 and 3. We will start analyzing the extreme
cases relative to x's values (1 and ~, we consider h odd but results are similar
for h even) fully describing the proof and, in a second time, stating the men-
tioned formula from obtained results.
Indivisibility of h by x
We analyze cases for which h is not divisible by x and x > 1.
then
')"(A)=l-c
with
mGC;(h,x) if r= 0
c= {
mGC;(h,x) + 1 if r = 1
skip 0.4 truecm Proof. Every class will take the positions congruent mod-
ulo GCD(h, x) to the starting one, the first circuit situation will be repeated
the first time in the circuit which is distant 1 + GC;(h,x) from the first and
than cyclically in circuits which distances from the first may be written as
1 + m GC;(h,x) ' where m is a positive integer. Now, with divisibility, also the
uniqueness of the intermediate or cut-node position reachable by each class
disappear. In more detail, if GC;(h,x) > 1, the number of such positions
is GC;(h,x)' taken as multiplicative factor of unitary increments of c every
h .. 0
GCD(h,x) CIrCUIts.
As stated in the theorem, we know that every GC;(h,x) circuits the condi-
tions of the jump are verified GC;(h,x) times and now, in order to check every
single jump, we propose to decompose GC;(h,x) in GC;(h,x) addenda, each
one representing the number of circuits needed to obtain the next jump. In
other terms we have to write
h
GCD(h, x) = eo + el + ... + e ac6(h,x} 1
where ei (i = 0,1, ... , GC;(h,x) - 1) are the said addenda. Going on, we may
express the intermediate positions reached by the node in x - I in the first
circuit in the other GC;(h,x)' without considering the order, as
then
"Y'(A)=I-c
with
r=Q if m=Q
m x
GCD(h,x)
1
if
if
{ GCn1b,x)
E
i=O
2
ei<r~Q
l~r~eo
if m;:::: 1
Example 2
Suppose h = 10 and only two chains with different I and x, but with x constant
in each chain (necessary condition to apply previous theorems); in particular
we choose {x = 2; 1= 1O} and {x = 5; 1= 12} . Following the length criterion
we shall select the second chain for which, h divisible by x, applying Theorem
15 we have: 12 - 1 = m 1~ + r with m = 5 and r = 1, then c = m + 1 = 6
and so "Y'(A) = 12 - 6 = 6. Applying the same theorem to the first chain (the
shortest) we have: 10 - 1 = m~o + r with m = 1 and r = 4 then c = 2 so
"Y'(A) = 8. In conclusion the first chain is more binding than the second even
if it is shortest.
As for the criterion to select chains, also the methodology followed to com-
pute "Y'(A) is no longer valid so we have to choose an alternative method. In
the following we will present an example showing this difference and useful to
69
Example 3
First of all, we assume to work on the binding chain or, alternatively, the pro-
posed methods have to be applied to all possible chains to select the significant
one. In the single chain, the aim is always to find the maximal number of jumps
allowed to all classes, looking at positions covered by each class in both chain
directions, going from the first circuit to the last and viceversa. We consider
the result allowing the lower jump conditions, computed dividing the number
of positions found by h, where the quotient is the number of jumps allowed
to all classes and the reminder is the number of classes that may jump once
more.
and Sb = P!,~Sb obtained from the mentioned relation p. = s.h + r.; in the
example, Sg = 2 with r g = 0 (all nodes can jump twice) and Sb = 2 with rb = 2
(all nodes can jump twice and two, 3 and 4, three times in direction g), then
,..'(A) = 6 - 3 = 3.
Note that we can count the total favorable positions PT adding pg and
Pb minus all the cut-nodes t, here counted twice, having PT = Pg - Pb - t =
12 + 14 - 5 = 21. Alternatively and more directly, we could compute PT, by
assumption 1, multiplying h by l - 2 minus t - 2 or 6 * 4 - 3 = 21. This is
useful because now it suffices to compute one between Pg and Pb obtaining the
other by difference with PT.
Following the notation introduced in the previous example, we can now
state the last theorem.
4 Conclusions
As we expected, in the first part of this paper we arrive to lower upper bounds
for primitivity index as stated in the previous literature by applying the con-
cepts of graph theory and using different techniques to show results. In the
second part we highlight the relation between periodic and primitive matri-
ces extending the concepts of primitivity index, defining ,..'(A) , to the class
of periodic matrices. The cases we analyze are simple and particular because
in this study we never drop assumption 1; they are intended to represent a
possible way to analyze the more complex cases exploiting the demonstration
technique. The interest of this extension is in term, as we already mentioned, of
the qualitative analysis of indices relations: if, for example, we are concerned
with periodic matrices and our time-scheduling coincide with the period, it
could be interesting to know when the diagonal blocks of the canonical form
become strictly positives. We think to input-output analysis where powers
of the matrix describing the economy show relations between industries at
different levels of production; alternatively, we can consider a Markov chain
representing the market demand transitions between firms belonging to the
same industry and so on.
71
Acknowledgements
References
S. CAMIZ
Dipartimento di Matematica
UniversitO. di Roma la "La Sapienza"
v. TULLI
Dipartimento di M etodi Quantitativi
Facoltd di Economia, Universitd di Brescia.
In this paper traditional methods used for computing the eigensystem of symmetri-
cal matrix are compared with a procedure in which one stage, Le. the computation
of eigensystem ofsymmetrical tridiagonal matrix, currently performed through LR,
QR or QL factorization or by bisection method, is replaced with a technique re-
cently proposed in leterature, since it enables a parallel implementation. The
resulting global method reduces by one order the computational complexity as
well as time execution, especially in parallel implementation, despite a little loss
of precision. Better results are obtained dealing with high order matrix.
1 Introduction
These stages may be separately examined having clear, however, that the
complete solution of the problem requires in some case the combination of
some of them, as is shown in Figure 1.
The methods considered in this study - just some among the many devel-
oped so far for solving this problem - are based on the following procedures:
~
METHOD FOR EVALUATING THE EIGENSYSTEM OF A SYMMETRICAL MATRIX
D~NAlllATlON .
~.
SYWWHRIC.\l "'TR~
i RECONSTRUCTION
. EICENVECTOR
CHARACTER5TC POlYNOW~ .
. ! IMTRIX
B5ECTON
!~RS( ITERATION
DMIJ£ £T IWPERA )
the eigenvalues of the original matrix, since all the matrices in the se-
quence are similar.
The LR algorithm for calculating the eigenvalues of a tridiagonal matrix
involves however some problems: this matrix is computed by the Gauss
elimination method, which implies, for the stability, that some rows of
the matrix have be usually exchanged so that the biggest elements (pivot)
are found on the diagonal. The interchanges cause however the loss of
the tridiagonal form (the lower triangle zeros remain, while upper trian-
gle ones get gradually lost), so, for this reason, the algorithm cannot be
efficiently applied to tridiagonal matrices. The basic process can how-
ever be used, after some required adjustments, to obtain a more efficient
algorithm. Each factorization of a matrix in the product of other two,
(which are then multiplied in inverted order), corresponds to a similarity
transformation. Since the problem of the LR algorithm is linked to the
stability of the method, a better procedure may be obtained by using a
stable factorization, as that provided by an orthogonal transformation.
The QR algorithm developed by Francis (1961) and Kublanovskaya (1961)
is related to the LR algorithm and is such that each real matrix A can
be decomposed in the form A = Q R, where Q is an orthogonal matrix
and R is an upper triangular matrix, as stated by the following theorem:
thus:
n p.
X= "'--'-Ui
L.J A. - A
i=l '
This expression of x shows that, if A is close to Ak and far from the other
eigenvalues and 13k is not too small, then x comes to be close to Uk as stated
(unless normalization). Moreover, if x is replaced with b, the denominator
Ak - A is squared and its power increases at each iteration, making x more and
more similar to Uk.
81
This process can be used with any matrix 8, but proves to be particularly
efficient with a tridiagonal one. In this case the system (8 - AI)x = b can be
solved by stable and efficient algorithms: the Gauss method (triangularization)
can be used for instance after the required permutations of rows and at the
k-th step only two rows must be considered: the k-th and the k + 1-th row
since all the lower elements in the k-th column are O. In this process each
iteration requires only 6(n - 1) products.
If the eigenvalues are well separated, convergence is very rapid (cubic). In
case of multiple or very close eigenvalues, eigenvectors are not usually orthog-
onal.
The Divide et Impera method for computing both eigenvalues and eigen-
vectors of a symmetrical tridiagonal matrix can replace steps 3 (a, b or c) and
4 or 5.
The Divide et Impera method (Cuppen, 1981; Krishnakumar and Mod, 1986;
Dongarra and Sorensen, 1987; Gill and Tadmor, 1990; Sorensen and Tang,
1991) is completely different from all the above considered methods for com-
puting a symmetrical tridiagonal matrix eigensystem. Like all the Divide et
Impera techniques it starts calculating both eigenvalues and eigenvectors of
a certain number of very small submatrices (order 2,3, or 4) of the original
matrix. The results are then used two by two to calculate the eigensystem of
bigger matrices. This procedure is iterated until the information required on
the original matrix are obtained.
Give a symmetrical tridiagonal matrix T of order N = 2n , the algorithm
can be summarized as follows:
A) n - 1 partitions of the matrix T are performed, where each partition
consists in dividing each significant matrix block (with more than one
element not zero) into four subblocks, obtaining 2n - 2 pairs of 2 x 2
matrices (besides the blocks in the lower left or in the upper right corners
of the resulting blocks have each one only one elements not zero).
B) eigenvalues and eigenvectors are calculated for each of the 2n - 1 matrices
of order 2, conveniently modified by the correspondent element outside
the block.
C) an iterative process is started (which will be described in the following),
to calculate (by using for each iteration the results obtained by the pre-
82
tN-I.N
tN.N-I tN.N
(1)
can be divided into the sum of
tn tI2
t2I t22
t",.m - f3 o
+ (2)
o
tN-I.N
tN.N-I tN.N
0 0
1 1
+(3
1 1
0 0
where (3 = tm.m+l.
That is
1+ ~bNb;"
[ T(l)
N/2
TN= b N-e
- (m) + eN
(m+1)
, (3)
N
T(2)
N/2
where the blocks T~I}2 and TJ}}2 are matrices of order N /2, (3 = t m •m +1 =I: 0
is the link between these two blocks and eN = (ell e2, e3, ... , eN) with ei =
o for every i =I: m, em = 1, e~+l = (el' e2, e3,"" eN) with ei = 0 for every i =I:
m + 1, em+l = 1.
By the Divide et Impera algorithm, the problem of computing the eigen-
system of N-dimensional symmetrical tridiagonal matrices, is reduced to the
84
(1) (1) t
}JJV/2}JJV/2 == IJV/2'
(2) (2) t
}JJV/2}JJV/2 == IJV/2' (4)
then one can compute the spectral decomposition of the TJV matrix of order
N by the following procedure:
1 [ I')
ZJV == J2
}JJV/2
}J(2)
JV/2
j'b N bJV ==
1
1..
(5)
so that in (3), (4) and (5), TJV is unitarily similar to a matrix obtained
by modifying a diagonal matrix through a rank-one matrix (Rank One
Modification). It results:
[ pll)
JV/2
]( [ A~)2 1+ 2/lZNZj., )
}J(2) A (2)
JV/2 JV/2
[ pll)
JV/2
,
p(2) ,
JV/2
1
==
[ pili
JV/2 1 + 2,8zJVz~)
[ }JJV/2
11)'
}J(2)
JV/2
(DJV
p(2) ,
JV/2
1
85
(6)
A(2)
N/2
1
II) the updating problem is solved by computing the spectral decomposition
of the ROM matrix through the methods that will be describe in the
following paragraph
TN =
=
[ p(')
N/2
PNANP~,
p(2)
N/2
1 QNANQ~
[ N/2
p(')
p(')
N/2
r
PNP~ IN. (9)
Thus, from
k k k
CPk(A) = II (d i - A) + IT L u~ II (dj - A) (13)
i=l
it follows
CPk+1(A) =
k k+1 k k+1
= (dk+1 - A) II
(d i - A) + ITU~+1 II
(dj - A) + IT L u~ II (dj - A)
i=l
k k+1 k k
= (dk+1- A) II (di-A)+ITU~+l II (dj -A)+IT(dk+1- A) L u~ II (dj-A)
i=l
k
= (dk+1 - A)CPk(A) + ITU~+1 II (dj - A)
j=l
k
and set 'l/Jk(A) = II (d j - A) it results
j=l
(14)
Therefore
with respect to A we can calculate <p~(A) for each value of A, and then use
Newton method to compute the eigenvalues.
Another technique to compute the eigenvalues of (D + auut)x = Ax is
based on the fact that, if Ui =F 0, i = 1,2, ... ,n, then
W(A) == 1 + a ~ d. ~ A
" U· (17)
i=l '
To complete the study of the eigensystem of D + auut one may verify
(Cuppen, 1981) that eigenvectors ql, Q2, ... ,qn are given by
i (D - Ai)-lu
i = 1, ... ,n (18)
q = II(D - Ai)-luIl2
1) Jacobi diagonalization;
Acknowledgments
Although the whole paper is attributable to both authors, Yanda Tulli has
written in particular Section 3 and 4; Sections 1, 2 and 5 have been jointly
written.
References
Golub G. H. and C.F. Van Loan, 1983. Matrix Computations, The Johns
Hopkins University Press, Baltimore, Maryland.
s. CAMIZ
Dipartimento di Matematica "Guido Castelnuovo"
Universitd di Roma "La Sapienza"
1 Introduction
An I/O table is a square n x n matrix F, whose elements lij are the value of
the i-th sector goods sold to j-th sector a. In addition to sectors, three vectors
are taken into account, final demand Y, value added V, and total production
X. The relations among matrix and vectors are described by the following
equations:
X=Fu+Y (1)
X'=u'F+V (2)
where u is a vector whose elements are all Is and the apostrophe stands
for vector or matrix transposition. In this way a complete information con-
cerning each sector total origin of expenses and total production destination is
provided.
Two matrices of particular interest may be obtained using equations (1)
and (2), namely
A= FX- 1 (3)
Q =X-1F (4)
where X is a diagonal (non singular) matrix whose elements are Xii = Xi . A
and Q are called technical coefficients matrices and represent respectively the
expense coefficients aij = lij/Xj, the value of sector i commodity necessary
to produce one unit of value of sector j production, and market shares qij =
lij / Xi, the share of sector i production sold to sector j.
aThe I/O table may be either square, thus referring to the same sectors both as input and
as output, or rectangular. If this is the case, some of the methods discussed in the following
lose their sense, in particular graph analysis.
94
II I
Manufacturing - final Manufacturing - intermediate
LFi < LF LFi > LF
LBi > LB LBi > LB
III IV
Primary - final Primary - intermediate
LFi < LF LFi > LF
LBi < LB LBi < LB
Lj% (5)
Liaij
purchases and sales, but not necessarily on each sector number of purchasers
or sellers, so that it may not be a quite consistent tool. Chenery and Watanabe
then tried to establish a sectors hierarchy, based on a one-way interdependence
model, because the previous method neglects «the fact that interindustry
transactions may involve either one or many other sectors and that the resulting
pattern of interdependence might, at least a priori, take an infinite variety of
forms» (ibid.).
Recently, the use of correspondence analysis (Benzecri, 1973; Hill, 1973; Lebart
et al., 1984) was proposed independently by Abbate and Bove (1992) and
Mattioli (1993), the formers stressing the identity among rows and columns
profiles, analyzed by correspondence analysis, and technical coefficients, and
the latter emphasizing that the distributional equivalence of correspondence
analysis chi-square distance minimizes the effects of the definition of sectors,
since two sectors having similar profiles may be summed-up without effects on
the analysis, so that structural analysis may be independent by the I/O model
chosen for both purchases and sales (Bon and Bing, 1993).
Correspondence analysis is an exploratory technique aiming at represent-
ing both data tables rows and columns on optimally chosen geometrical spaces,
such that proximity among rows or among columns on such spaces may be in-
terpreted as their profiles similarity. The technique applied on a data table K
is based on the scalar product among rows given by
(6)
Here, 8' 8 ij is the generic term of matrix product 8'8, where 8 is a centered
97
(8)
8' 8 ij measures the covariance of i-th and j-th columns with respect to stochas-
tic independence.
The eigenanalysis procedure gives the eigenvalues in decreasing order, and
it is proved the corresponding eigenvectors represent the directions where data
table both rows and columns profiles may be best represented, i.e. the first
k eigenvalues span the k-dimensional space where the points scattering best
approximates the scattering of points on the original n-dimensional space. It is
proved that this optimum corresponds to the measure of inertia based on chi-
square distances among both rows and columns, i.e. distances corresponding
to the given scalar product:
X=AX+Y (10)
0< J.£* < 1, where J.£* is the maximum eigenvalue of A, and thus the following
equality holds:
00
Here, aij represents the n-th order interaction between two sectors, that tends
to zero for n large enough. The same can be said for Q:
00
x= (I - A)-ly (16)
We may look for a method aiming at revealing and sythesizing these in-
teractions. This is of particular interest, for let us consider what happens in
the case of circular relations, that is those cases in which the sequence of sales
returns back to the starting sector: it is clear that variation of demand of only
one sector goods of the sequence has influence on all involved sectors. Yan and
Ames (1965) studied interactions through the interrelatedness function R, as
the sum of diversification and indirect relatedness indexes, based on the order
matrix B, associated to A. In B, each bij indicates the lowest degree n such
that aij =1= 0 and, given a submatrix of A composed by rows i = (il, i2, ... , ir)
and columns j = (j1,l2, ... ,is), R is
· .) -
R( IJ
'rs
- -
1 LL-
r
b
S
rs
L= krs
1 -_- - +
·
- nl nk (19)
h=l k=l i "Jk k=2
Diversification and indirect relatedness indexes are the two terms summed
in last member of (19), where nk represents the number of the submatrix
elements whose value is k. The first index, ndrs, represents the proportion of
industries to which a given sector either sells or buys; the second summarizes
the proportion of indirect relations.
So far, no emphasis was given to circular relations among sectors, although
it is not wise to ignore such important components of an economic system, as
industrial blocks with strong circular relations among sectors are, probably
because they did not fit properly into the a priori models used up to that
time. Actually, only through the use of different mathematical tools better
analysis methods may derive, namely through graph theory, able at revealing
the complete structure of the economic system as well as its skeleton, deemed
as the set of strongest sectors and main flows among them.
The use of graph theory in I/O analysis may be done by representing all sectors
as nodes and the commodities flows between two sectors as oriented edges con-
necting them. Although not explicitely stated, Yan and Ames (1965) indexes
are based on a minimum distance matrix among a graph nodes. The first ex-
plicit application of graph theory to the I/O analysis is due to Ponsard (1967),
who introduced the signal-flow graphs in this frame: «transition instruments
from a matrix analysis to topological interpretation [... J, transfert graphs sug-
gest an original formalisation, most elegant and most powerful» (pag. 356).
Far from being a simple graphical representation of commodities flows that
circulate through economy sectors (that, in author's opinion, would be enough
101
to get it a most helpful tool; see also Carpano, 1980), graph theory enables
to define the influence relationships between two sectors, by showing the path
that goods follow, going from one sector to the other. The meaning is clear: if
one sector varies its production, all sectors that provide commodities to it vary
their production accordingly, as well as all sectors that provide commodities
to providers, etc. Each variation in one sector is then broadcasted to other
sectors as a variation of existing flows among them, say paths composed by
one or several edges. We know that the overall measure of variation, namely
the global influence is given by Z and W matrices coefficients, but using flow
graphs Lantner (1974) demonstrated that influence between sectors may be
partitioned according to the several paths that connect the two sectors. Given
a couple of sectors being origin and destination of an economic stimulus, and
all paths connecting them, each path influence may be computed. In addition,
a demand multiplier is introduced, due to the path itself, as a coefficient that
measures the raise of production of a sector per unit increase of final demand
(Samuelson, 1987). In this way, a path or a circuit may be considered not only
as the juxtaposition of adjacent edges having no effective relation among them,
but as the real path of influence circulation among sectors, itself contributing
to commodities exchanges.
It seems clear that the idea of studying I/O tables through graph theory
related methods has many advantages. In particular, it overcomes the re-
striction given by Simpson and Tsukui (1965) triangularisation, based on an a
priori model that does not fit to the actual possible tables structures (Benzecri,
1973): in facts, a graph may take an infinite variety of pattern. Secondly, it
allows the identification of strong blocks of economy, as those whose circular
relationships are stronger; related to it, the study of vulnerability (Camiz and
Pucci, 1986, Camiz, 1987), i.e. the identification of sectors most succeptible to
be cut off the said industrial blocks, helps in the detection of strategic sectors.
For this reason, an exploratory technique in some sense connected with this
model may be designed, since the currently available techniques seem limited
at the most to a comparison of direct flows between each couple of sectors
(Bove and Critchley, 1989; Abbate and Bove, 1992).
In Camiz and Pucci (1986) and Camiz (1987) headlines were given of the
use of graph theory for I/O tables analysis, and Camiz (1993) describes a com-
puter program able at giving a complete description of an economy structure,
based on industrial blocks, and analyze each block structure in order to de-
termine the strategic imp or- tance of industries into them, in connection with
the striking power and vulnerability analysis.
102
An (oriented) graph is a couple (N, E), where the elements of set N are called
nodes and those of set E are ordered couples of nodes, called (oriented) edges
(in the following the word oriented will be dropped, should no ambiguity arise):
if e = (x, y) is such an edge, we shall say that e leaves x and enters y (or that
e connects x and y if the orientation is not taken into account). A graph is
usually represented by a drawing where nodes are dots or circles and edges are
straight or curve lines, with an arrow indicating the edge orientation, if any.
Two nodes are called adjacent if it exists an edge that connects them, a
node is adjacent to an edge (or vice versa) if the edge enters or leaves it, and
two edges are said to be adjacent if there exists a node adjacent to both. We
define as well:
(1) a chain connecting two nodes x and y, a totally ordered set of edges, each
one adjacent to its successive, such that x is adjacent to the first edge and
y is adjacent to the last edge of the set, regardless each edge orientation;
(2) a path leading from x to y, as a chain, connecting x and y, such that each
edge of the chain enters the node that the subsequent edge leaves;
(3) a circuit through x and y, as a path leading from any node to itself,
containing x and y as nodes adjacent to some edge of the path.
We define as a chain (path, circuit) length the number of edges that com-
pose it. Given a path leading from x to y, we say that x is an ascendant of y
and y is a descendant of x. We will call them direct ascendant or descendant if
the shortest path length is 1. We define inner degree of a node the number of
direct ascendants, outer degree the number of its descendants. On the degree
base we can classify the nodes according to their relative position in the graph,
thus defining the node centrality:
(7) sink: a node with zero outer degree, that is with no leaving edge.
(1) weak connection: there exists a chain connecting x and y, or x and yare
the same;
(2) strong connection: there exists a circuit through x and y, or x and yare
the same.
Clearly, the strong connection is a subset of the weak one, so that the
induced partition of the strong is a refinement of the weak. The partitions
components containing more than one node are called weakly connected com-
ponents (or simply components), and strongly connected components (or simply
blocks), respectively. For each node of the graph, we can define a degree of con-
nection corresponding to which component type it belongs: it can be strongly
or weakly connected, or merely disconnected (isolated node). Paying attention
to a node x, based on relations with all others, one may partition them into
five classes:
(1) strongly linked: these are the nodes connected to x through a circuit: with
x they form a block;
(2) ascendants: these are the nodes connected to x through a path leading to
x;
(3) descendants: these are the nodes reachable from x through a path origi-
nating from x;
(4) side connected: these are the nodes unreachable from x, but, belonging to
the same graph component, they are linked to x through a chain;
(5) disconnected: these nodes do not belong to the same component of x, thus
no linkage exists among them and x.
This partition may help in describing in higher detail both node position
and importance within the graph. In fact, the existence of strongly linked nodes
means that those nodes belong to a strong block; the number of ascendants
and descendants may help in understanding the hierarchical position of the
node. Nevertheless, a better approach may be done through quotient graph.
104
8 Quotient graphs
Given a graph, one may build the quotient graph given the relation of strong
connection (that we shall call the condensed graph, obtained by collapsing the
original one), considering two nodes equivalent if they belong to the same strong
component, and two edges equivalent if they leave equivalent nodes and enter
equivalent nodes.
After collapsing, all nodes belonging to a strongly connected component
are collapsed in a single node, all edges connecting equivalent nodes disappear,
and all equivalent edges are collapsed in a single edge connecting the two
resulting nodes. Of course, different orientation of edges results in the presence
of two opposite edges.
The usefulness of condensed graphs is due to the fact that it has no circuits:
for this reason a level hierarchy can be defined, starting from the source and
moving to the sink, by defining each node level as the length of the longest
path leading to it from a source node. One could as well move in the opposite
direction and find a slightly different hierarchy, due to the fact that two paths
leading from source to sink may have different length.
Let us consider a block and wonder what happens to its structure if we extract
an edge e = (x, y): two cases may arise, whether or not it exists a path leading
from x to y that does not contain e. If such a path exists, then all chains,
paths and circuits, originally containing e, can be modified, introducing this
path; otherwise, the connection structure of the whole component is modified,
in the sense that some of the nodes will lower their degree of connection due to
the elimination of the edge e. The latter being the case, we shall say that the
edge e has striking power over the component and over all the nodes that lower
their degree of connection. These nodes will be defined as being vulnerable
bye. In the same way a node striking power may be defined, as the effect of
the extraction of a node, equivalent to the simultaneous extraction of all its
adjacent edges.
If attention is drawn on a strong block, we can say that the striking power
is:
(1) null if no consequence derives on the block structure from the edge or node
removal;
(2) weak if some of the block's nodes are no longer strongly connected, but
the reduced block still exists;
105
(3) medium if the block is splitted into two or more blocks, plus some extra
node set apart, if any;
(4) strong if the whole block is destroyed, in the sense that no more circuit
exists, among the block nodes.
1 if lij > a
= 0 i=l, ... ,n (20)
o otherwise
sector in the economy may then be analyzed, by considering inner and outer
degrees and centrality attributes, as well as the kind of linkages that exists
between each node and all others, the belonging to a block and its level in the
hierarchy being pictured by the condensed graph. In particular, the position
of blocks is clearly shown.
The interest of blocks is due to the strong connection among inner sectors
and the weak connection with the outer ones, so that much stronger influences
deal within the blocks than between them. It is evident that sectors belonging
to the same block are mutually sustained, due to the circular relationships.
Nevertheless, not all sectors in a block are alike: to determine the relative
importance among block inner sectors one may evaluate sectors centrality,
now limited to the edges connecting inner nodes, but more by evaluating edges
and nodes striking power and nodes vulnerability, for they mark those edges or
sectors whose removal from a block (due to the vanishing of some flows or to
their lowering under the threshold value) causes the detachment of vulnerable
nodes or, even worse, the complete annihilation of the block itself.
A special care may be used in considering striking power and vulnerability,
since their meaning strongly depends on the choice of a. Actually, vulnerability
may result if the alternative path to a removed edge is only very little lower
than a, so that a real vulnerability analysis has sense only for a = 0, unless to
the used threshold value may be given a clear economic meaning.
As an example, let us consider the Italian 1988 I/O table (Istat, 1992) reduced
to 16 sectors to be used to compare the different descriptive techniques. The
sectors and their labels, used in tables and graphics, are listed in Table 2. This
choice was done considering the previously described triangulation experiences
(Camiz, 1987): the dramatic improvement of hardware allowed us to triangu-
larize the 16 sectors matrix (without manipulation) on a Unix Convex parallel
machine in about 43": a lightning compared with the estimated 4 h 30' in 1987,
but still too long to consider to triangularize the original 44 sectors table.
The table is quite filled: only 43 off-diagonal flows are zeros, the other
flows ranging from .124 through 303865.22 billion liras, with an average of
3619.6373 billion liras (19838.161 standard deviation). The distribution is
strongly skewed, with median 681.464 and only 30 flows above the mean value.
Both the original table and the triangulated one are shown in Figure 1 (A) and
(B): the sequence of sectors shows in order those that most sell commodities to
other sectors, such as Energetic productions, Rescue and restoring, Communi-
cation, Entreprises supplies, and House rentals, through the buyers or anyway
107
-----------------------------------------------------------------------------
A) DIRECT : LINKAGES
-----------------------------------------------------------------------------
) I linkages variances
In. I sector ------------------------------------------------------------
I I I backward I forward I backward I forward
--------------------------------------------------------- -------------------
strong backward : strong forward I
31 Tranprod .6332 I 21 .5745 I 71 2.471 51 2.740 61
51 Rescrepa .4645 I 61 .5858 I 61 3.198 11 2.185 81
81 Transpor .4729 I 51 .5741 I 81 1.319 121 1. 873 91
101 Bankinsu .9242 I 11 .9381 I 11 2.913 31 2.780 51
strong backward weak forward I
41 Building .4792 I 41 .1824 I 131 2.669 41 1.332 141
71 Hotelpub .5014 I 31 .1233 I 141 2.072 81 1. 335 131
weak backward : strong forward I
11 Agrzoofi .3968 I 71 .8003 I 41 2.090 71 2.855 41
21 EnerProd .3344 I 81 .8113 I 31 2.929 21 1.541 10 I
91 Communic .2411 I 121 .6297 I 51 1.043 141 1.358 121
111 Entrserv .2147 I 141 .9191 I 21 1.035 151 1.314 151
weak backward weak forward I
61 Tradserv .2726 I 91 .3020 I 111 .9447 161 2.210 71
121 Housrent .1532 I 161 .1839 I 121 1. 919 91 1. 539 111
131 Resescho .2517 I 111 .3727 I 91 2.091 61 3.054 31
14 I Privheal .1666 I 151 .0034 I 151 1.834 101 4.000 21
151 Amuscult .2148 I 131 .3394 I 101 1.130 131 1.217 161
161 Nosalser .2705 I 101 .0001 I 161 1. 510 111 4.000 11
-----------------------------------------------------------------------------
B) TOTAL ) LINKAGES
-----------------------------------------------------------------------------
I I linkages variances
In. I sector -------------------------------------------------------------
I I I backward I forward I backward I forward
--------------- -------------------------------------------------------------
forward
strong backward ! strong I
31 Tranprod 2.347 I 21 2.139 I 81 2.931 51 3.236 31
51 Rescrepa 2.048 I 31 2.190 I 61 2.246 141 2.079 131
101 Bankinsu 4.121 I 11 4.514 I 11 2.901 71 2.632 81
strong backward weak forward I
41 Building 2.045 I 41 1.290 I 131 2.215 151 3.164 41
71 Hotelpub 2.001 I 51 1.261 I 141 2.109 161 3.149 51
weak backward , strong forward I
11 Agrzoofi 1. 799 I 71 2.756 I 41 2.720 101 2.354 101
21 EnerProd 1.574 I 81 2.787 I 31 3.374 11 2.031 141
81 Transpor 1. 919 I 61 2.157 I 71 2.381 131 2.289 121
91 Communic 1. 455 I 111 2.286 I 51 2.709 l11 1. 812 151
111 Entrserv 1. 403 I 131 3.077 I 21 2.970 41 1.584 161
weak backward weak forward I
61 Tradserv 1. 491 I 101 1. 583 I l11 2.781 81 2.719 71
121 Housrent 1.303 I 161 1. 353 I 121 3.033 21 2.914 61
131 Resescho 1. 421 I 121 1.868 I 91 2.777 91 2.330 l11
141 Privheal 1.353 I 151 1.009 I 151 2.918 61 3.960 21
151 Amuscult 1. 375 I 141 1.588 I 101 3.012 31 2.607 91
161 Nosalser 1. 529 I 91 1.000 I 161 2.581 121 4.000 11
----------------------------------------------------------------------------
Direct Linkages
VoI.IH
0,8
-.
TranplOd
D.D
i HaIoI>·~.101ng
J 0.4
T~
Agacofl
EnerPIIOd
T _ ........cho
Commune
0.2 Am ...... EnbMIV
Hout.nt
0
0 0.2 0.' o.e 0,8
Forward
Total linkages
VakJes
TranpfOd
AQrzoofi
EnerPIO:I
Ent...erv
o 3 5
Forward
Aals 2 Axil 2
ED.rProd~-·--------------+-------------------------------
PriYbeal I
__ + v.lue.dd-------------t --- -- -------------________ - - _____ - - __ t
JIoI.Ilrent I • I I
I I
I ~cv.1t I I I
&ftt....rve-anic I _rprOCi I I
No.alHrAquoofl I I I
I I a,r&ClOU I
It.eses~ Ilescrep. I I I
.. '".dlu. Hotelpub I I I
I I I I
I Bulhl1n, I I I
I Tc.an.apor I tnn~rtranprod
I Tnnprod t-----------·--------t--r.sc:r!lpl.-----------________________ •I
I I I I I
I I I I I
I I I I reseseM I
I I I c-mic: _,culttradun' I
•________________________.________________________________ e.
I
I I
I
I
I
I
I
I
I
bul leliA'
I
I
I
I I I I bousrtlntbohlpub I
I I I I I
I I I I pnvtM!••
I I • I nos.ber I
I I I I
I I I I
I I I I
I I I I
I I I I I I
+--------+----------8.. nk10Iu------------_+ __________ '1na<SeN entr'erv----bataklnlu-t---------------t---------------.-----t
Axh 1 Axial
Axi.ll
+------------------Tranprod--------------------___________
I I
e.
I
Axis J
+-----------------------------.'tozoolltrMprod------------t
I I I
I I I I I I
.. Aqrzoofi I I I I I
I I I I I I
I I I • I I
I I I I I
I "'eserep. I I I I
I Hatelpub I I I I
I BuUdin, I I I I
I I I I I
I I I I relerep. I
I I I I I
I I I I I
B.lnklnIU-----------------+----------------------------___
I I
wet
I
banUtlIU entrs.n' I
t--------------------------------t--tr.nspor------------ ___ t
I
I I I I I I
I I Fin.deN t I tradlerv I
I I I I I I
I I I I I I
I I I I ... lueoldd I I
NosalaerTranapor I I I I I
Pr!Yh. . l I I I ~ic I
ae •••cbot:ntr.e", I I I I I
I Trad.srv I I I I I
.. eo-unlc I I • I I
I "-u.cult I I I I I
lIouuent I I I enerprod IIot.lpubpnvbe.. l
I I I I I .....cult noa .. lNr
EnerProd-+---------------+---------------t-----------------t
Ad. I
t----------------.---------------.----------bulldlnqho""rent
Axis I
Axia 3 Axis 1
+----------------+----------Tranprod-----------_·_·-----••••
I I I
t---------------------------
I
t ranprodl9r&ootl-- ---- ---------.
I I
I I I I I I
+ I A9uoofi I I I I
I I I I I I
I I I • I I
I I I I I
I I Rescrep. I I I
• I Hotelpub I I I
I I 8ulldln9 I I I
I I I I I
I I I t.ICtep. I
I I I I I
I I I teselcho I
a ..nkinsu-----····.------··------·----------------·· ___ --___ • I entnerv I J
I I I bsnklnsu------------------------tral'1spor-------------------t
I I I I I I
F1n.-d_ I I I t ....cIa • .:.· I 1
I I I I I I
I I I I I I
I I I I I .. alue..deI
I I Tr .... spor Mo... her I I I I
I I Prhnul I I ~icl I
I I Jl.esucboEJltrserY I I I I
I I Tud.en' I I I I
• I c-un1c I
I I Kousrent I •I II II
I
I
I
I
.----------------t---------------t-------.·----__ I
+ __ EnerProd
:
"-ascult
I
ftO~!t:::tr:n9-.eul~ enarprCtd :
t---------------!\ousrent---------t---------------.------- __ t
Axis 2 Ads 2
Figure 5: Representation of backward (left) and forward (right) linkages on the correspon-
dence analysis planes spanned by factors 1-2, 1~3 and 2-3.
113
opposition of Final demand column to all other sectors on the plane spanned
by the first two axes, with Banking and insurance backward linkages opposed
to all others on the second axis. The forward linkages of both Entreprises
supplies and Banking and insurance are as well opposed to all other rows on
the same plane, which form a kind of seriation. The third axis clearly separates
strong backward linkages from weak ones.
The graph analysis was performed first without threshold, then considering
only the 30 flows grater than the mean value. In the first case a strong block
composed of 15 sectors is ascendant of the only sink, corresponding to Non-sale
supplies sector. Within the block, most sectors are directly adjacent to most
of all others, only Non- sale supplies and the Private health sector, weakly vul-
nerable by its only reachable sector, namely Agriculture, livestock and fishing,
are not fully integrated in the strong economic structure, and Research and
education and Private health are the only sectors within the block with fairy
low outer degree. The graphical representation of the strong block structure
is difficult to read, since too many crossing edges should be represented.
If we consider the graph limited to the 30 greatest flows, the structure
is most variated, showing a pattern of higher interest. At this level, three
sectors are isolated, namely Research and education, Private health, and En-
tertainment and culture, a 9 sectors strong block results, the collapsed graph
resulting as shown in Figure 6 (left): Energy production and Communication
are both sources, both reaching the strong block A and through it reaching
both sinks Hotels, restaurants and bars and Non-sale supplies. The latter is
also reachable directly from Energy production. Within the block (Figure 6,
right), the Transformation production is by far the most important sector, rep-
resenting both graph center and anti-center and having strong striking power
on the block itself. Other sectors having weak striking power are Building and
public constructions over House rentals, Trade supplies over both Building and
public constructions and House rentals, Entreprise supplies over Banking and
insurance, and House rentals over Building and public constructions.
The importance of Transformation productions is stressed, considering that
ofthe 11 edges having weak striking power, 8 are its adjacent: four are entering
from Agriculture, livestock and fishing, Rescue and repairing, Trade supplies,
and Communication, and four are exiting to Agriculture, livestock and fish-
ing, Rescue and repairing, Trade supplies, and Transportation; the other three
edges connect Building and public constructions with House rentals, Entreprise
supplies with Banking and insurance, and House rentals with Trade supplies.
The inspection of Figure 6 representation of A block, adds interesting con-
sideration to what was exposed up to now. In particular, the weak position of
sectors 10 (Banking and insurance) and 12 (House rentals), the latter included
114
Figure 6: The graph corresponding to the 30 flows greater than the mean. Left: collapsed
graph; right: the A block structure
115
in the circuit 3 -> (11) -> 4 -> 12 -> 6 -> 3 and 3 -> 11 -> 4 -> 12 -> 6
-> 3, and the former included in the circuit 3 -> 11 -> 10 -> (6) -> 3 (the
sectors within parentheses may be bypassed). It may be noted that sector 11
(Entreprises supplies) has only one entering edge, from Transformation pro-
duction, whereas sector 6 (Trade supplies) has only an exiting one, to Banking
and insurance.
12 Conclusions
Acknowledgments
The author is most indebted with Antonello Pucci, who helped in the initial
formulation of graph methods in 1983. Thanks are due to both Marco Martini
and Silvana Stefani who strongly encouraged and granted the present work.
The graph analysis programs were developed with participation of Mariano
Patane, Marco Cellucci, and Roberto Granato.
References
Benzecri, J.P. , 1973. L'analyse des donnees. Tome II, L'analyse des cor-
respondances. Dunod. Paris.
Gantmacher, F.R. , 1959. The theory of matrices, vol. II, Chelsea Pub.
Co., N.Y.
M. GILL!
Department d'Econometrie
UniversiU de Geneve, Suisse
1 Introduction
The case where a perfect matching does not exist constitutes a heavy
challenge for the model builder. In Section 4, we cope with this problem using
minimum cardinality covers in the bipartite graph associated to the model's
Jacobian matrix.
Throughout the paper, we use examples to illustrate our approach and we
also suggest the algorithms which are able to solve these problems efficiently.
i = 1, .. . ,n . (1)
The model builder has then to specifya the set of endogenous variables, i. e.
the partition
X=YUZ
where Y is the set of endogenous variables and Z is the set of exogenous
variables. This then defines the model
(3)
G= (H,Y,E) (4)
where H is the set of vertices representing the rows hi, i = 1, ... , n of the
Jacobian matrix. The set of vertices Y represents the columns of the Jacobian
a Clearly, as far as behavioral equations are concerned, the choice of the endogenous
variables has already been made.
122
matrix, i.e. the endogenous variables. E is the set of edges such that [hi, Yj] E E
iff ~ =1= O.
In order to illustrate this, let us define the following variables:
BPOARD Net change in exchange rate reserves;
BPENC Loans to public enterprises on favorable conditions;
BPMCA Private capital entries;
BPLTP Long term capital entries;
BOC Balance of current transactions;
FLU Exports plus taxes;
R French interest rate;
RE Foreign interest rate;
S Exchange rate;
sa Anticipated exchange rate;
T RES Index of companies' reserves;
TCG Coverage rate of the balance of current transactions;
TCoCDE Global coverage rate of OECD countries;
DM Deutsche Mark exchange rate.
Consider a system of functions as specified in (2) given by the following 5
equations
BPMCA .. BPENC
FLU =ao+al(~R-~RE-S+sa)+a2 FLU +a3TRES
H y
I~---~IO S
1 1 1 1 H Y
1 1 1
1
1
1
HITli]
1 1 Y @TIJ ~~~~~O BPORD
1 1
H ali
o BPMCA
In the following, we will use the bipartite graph G defined in (4) to investi-
gate a necessary condition for matrix D as being nonsingular. The determinant
of matrix D can be written (Maybee et al., 1989: p. 501):
n
IDI = L s(p) II d iPi (5)
pEP(n) i=l
where P(n) is the set of n! permutations of set J = {1, 2, ... , n}, Pi is the i-th
component of permutation p and s(p) is a sign function. We then immediately
conclude that a necessary condition for IDI =f. 0 is that there exist at least one
permutation p, such as the product in (5) is nonzero.
A set of n nonzero entries dipi , i = 1, ... , n corresponds in the bipartite
graph to a set of n non-adjacent edges. By definition a set of non-adjacent edges
in a graph is called a matching, denoted by Wand a matching of cardinality
n, i.e. saturating all the vertices of the bipartite graph, is called a perfect
matching.
The proof for theorem 1 is given in the explanation that follows relation (5).
Whereas the identification of a permutation p, verifying the existence of a
nonzero product in (5) is a very hard task, it is easy to establish the maximum
cardinality of the matchings in graph G.
124
simply by exchanging the sets /-Lw and i-Lw in W. Thus we have W' = {W-
/-Lw} U /-Lw· By construction card(i-Lw) = card(/-Lw) + 1 and therefore (6) holds.
We illustrate this with the bipartite graph in Figure 2 where the edges
belonging to the matching W = {[hl,Rj, [h 2 ,BPORD], [h 3 ,BPMCAj, [h4'S]}
are drawn in dotted lines.
H Y
hl o S
h2
h3 o BPORD
h4 o sa
h5 0 o BPMCA
The sets of unsaturated vertices are then H" = {h5} and Y" = {sa} and
an augmenting path is given by
_ -_ _
0 ...............,....
, _ __
R h2 BPORD h5
where J.tw = {[sa, hI), [R, h 2], [BPORD, h5]} and Jtw = {[hI, R], [h2' BPORD]}.
Exchanging the edges in the augmenting path gives
R h2 BPORD hs
which then defines a new matching W' with its cardinality augmented by one.
Figure 3 shows the matching W'.
H Y
o BPMCA
• edges ei E W are oriented so that the starting vertex is in H' and the
ending vertex is in yl;
Figure 4 shows the orientation of the edges for the bipartite graph G with the
matching W' given in Figure 2.
~~~~o BPORD
o BPMCA
In this section we show that, for systems of equations verifying a perfect match-
ing, it is possible to associate an oriented graph whose vertices are the variables
in the equations. Such a graph proves useful in analyzing the logical structure
of the equations. In particular we will show that some interesting properties
of this oriented graph are invariant with respect to the matching chosen.
Again we represent the structure of the system with a bipartite graph.
However, as we want to include the exogenous variables, we now derive the
eThe best known algorithm is O(n 2 . 5 )(Hopcroft and Karp, 1975).
127
(7)
where the sets H and X have already been defined in connection with (1) and
EO = {[hi, Xjl I ~3 f. O} is the set of edges.
We now consider that the model satisfies the necessary condition for the
local uniqueness of the solution, i. e. that there exists a matching W in GO
which saturates the vertices of set H and the vertices of set Y. We recall that
in the subgraph G = (H, Y,E) of GO, already defined in (4), involving only
sets Hand Y, this matching is a perfect matching.
The matching W enables the definition of a particular orientation of the
edges of GO and we get the oriented version
(8)
of our bipartite graph GO. The set of arcs UO is constituted by U', the set of
edges belonging to W which are oriented from H to X, and the set of arcs U,
i. e. all other edges which are oriented from X to H. Formally we have
UO = U'UU
with
H x
h 1 (X3,X4,XS) =0
h2(Xl, X2, X4, X5) = 0
h3(X2,X3,X7) = 0
h4(Xl,X4,XS) = 0
h5(X2,X7) = 0
hS(X5,X7) = 0
Gw = (X,U)
'For a detailed discussion of the analysis of causal structures see Gilli (1992).
129
~
>< Rest
Q'~
....:.<.... Rest
o •
GW· 0··················-0 YI
h· of hiO~OYI of
.~ G w GWI
~~ ~~
.
J •••, ••••••
w
Finally, if the strong components in G and G w' are identical, we con-
clude from theorem 3 that the corresponding condensed graphs G w and G w '
also verify the same strong components.
The invariance of the reduced graph is then due to the fact that an edge
between different strong components in G w, or an edge connecting an exoge-
nous variable, can by definition not belong to an alternating circuit. Therefore,
such edges will remain unchanged for all different matchings.
seen that the structure differs from one graph to another. For instance, vari-
able X4 has a different position in all three graphs. Moreover the arcs will also
be valued differently in each graph.
It is well known that the convergence of the Gauss-Seidel algorithm de-
pends on the eigenvalues of a matrix B = (L + diag(D))-lU, defined by split-
ting the Jacobian matrix D into L + diag(D) + U, where L is lower triangular,
diag(D) is the diagonal of matrix D and U is upper triangular.
The eigenvalues of B depend of course on the ordering of the equations,
yielding different splittings of the Jacobian matrix. This corresponds to si-
multaneous row and column permutations. Different matchings correspond to
independent permutations of the rows and columns of the Jacobian matrix and
therefore also influence the eigenvalues of matrix B.
hl: !1(Yl,Y2,Y3,Y4,Y5) =0
h2 : Y6 = h(Y3)
h3: Y3 = /a(Y7)
h4 : !4(Yl,Y2,Y4,Y6,Y7,YS) = 0
h5 : !5(Y5, Y6) = 0
h6: Y6 = !6(Y7)
h7 : Y7 = h(Y3)
hs : !S(Y3, Y5) = 0
132
which is supposed to represent the mix of explicit and implicit relations one
frequently encounters in real macro econometric models. One can verify that
the maximum cardinality of a matching for these eight equations is 6. There
exist 252 different matchings with cardinality 6 from which we select: W =
{[hI, YIj, [h3, Y3), [h4' Y4), [h5, Y5), [h6, Y6), [h7' Y7)}.
In order to remove the singularity of the system of equations, a simple
strategy would consist in dropping the n - p equations which are not in the
matching, i.e. equations h2 and hs for our example. However, the resulting
model will depend on the particular matching we selected before and which is,
as indicated, not unique. Moreover, one might not wish to exogenize some of
the n - p variables that are not in the matching, i.e. the variables Y2 and Ys.
This problem can be approached in a far more efficient way. To do this,
we introduce the notion of cover in the bipartite graph G = (H, Y, E) and we
will be interested in a minimum cover9 , i.e. the smallest set of vertices which
meets every edge in G. An interesting relation between matching and covers
is then given by the following theorem:
This means that the maximum number of edges in a matching equals the
minimum number of vertices in a cover.
Given a bipartite graph G = (H, Y, E), verifying a maximum cardinality
matching W, with card(W) = p, p < n, we will use a minimum cover C to
reorder the Jacobian matrix D. We denote by He the set of vertices in the
cover belonging to Hand Ye the set of those vertices in the cover belonging to
Y. Let VI = card(Hc) and V2 = card(Ye), with obviously VI +V2 = p. We now
reorder the rows of the Jacobian matrix by taking first the n - VI equations
from set He and then the remaining VI equations from set He. The columns
are reordered taking first the V2 variables from set Ye and then the n - V2
variables from set Ye. As a consequence, matrix D will show the following
pattern:
Yc Yc
(9)
H Y
h3 1 1
h5 1 1 YI
He
h6 1 1
h7 1 1 0 6,4 h3
h2 1 1 Y4
hg 1 1 Y5
{ hI 1 1 1 1 1 Y6
He h4 1 1 1 1 1 1 h7 Y7
Y3 Y5 Y6 Y7 Y2 yg YI Y4 hg 0 o yg
"-v--'''-v--'
Ye Ye
The sets He and Ye then clearly indicate where the modifications of the
equations should occur. More precisely, the n - p equations which have to be
modified must be chosen among the set He and the variables which have to
be added to these equations have to be in set Ye. In case one is willing to
exogenize the n - p variables not saturated by the matching, once again, the
set He indicates where to choose the n - p equations one has to drop. In the
case of the example, without the information given by the cover, one would
automatically drop equations h2 and hg , whereas the set He allows us to chose
two equations among a set of six equations.
generated by the matching W, with H' and Y' as the sets of saturated vertices
and H" and Y" as the sets of unsaturated vertices.
We now need to define R(hi ) the set of proper descendants of hi, i. e. the
set of all vertices reachable along all alternating paths starting from vertex hi.
By definition, the starting vertex hi does not belong to R(h i ). We then have
as the set of proper descendants from the set H" of unsaturated vertices. We
also need the set of edges WW' C W which belong to the different alternating
paths starting from H". We then have the subsets TH C H' and Ty C Y' of
vertices saturated by WH" and, of course, card(TH) = card(Ty).
The set R(H") then verifies the following property:
This then defines the sets He and Ye of the partition of matrix D given in (9),
i. e.
He = H' - TH and Ye = Ty
Let us illustrate this result with our example; the corresponding graph
is given in Figure 8. W = {[hl,YI], [h 3 ,Y3], [h 4,Y4], [hs,Ys], [h 6,Y6], [h 7 ,Y7]}
is the maximum-cardinality matching defining the partition H' = {hI, h 3, h 4,
135
h 5, h 6 , h7} and H" = {h 2 , hs}. We then explore all the alternating paths
starting from vertex h2 and vertex hs and we get the sets of proper descendants
R(h2) = {Y3, h 3 , Y7, h 7 , Y6, h6} and R(hs) = {Y5, h 5 , Y6, h 6 , Y7, h 7 , Y3, h3}' The
union of the sets R(h2) and R(hs) gives R(H") = {Y5, h 5 , Y6, h 6 , Y7, h 7 , Y3, h3}
and we easily verify that R(H") partitions into TH = {h 3 , h 5 , h 6, h7} and
Ty = {Y3,Y5,Y6,yd. Thus we have He = H'-TH = {hl>h4} and Ye = Ty =
{Y3, Y5, Y6, Y7} which defines our minimum cover C = He U Ye.
5 Concluding remarks
number of which becomes very large even for graphs of relatively modest size.
Several questions then arise: How to describe the structural characteristics of
this very large set of graphs? How does a particular matching influence the
numerical behavior of solution algorithms?
For the first question one could think that it might be possible to clas-
sify the different oriented graphs corresponding to the matchings into a much
smaller number of classes of isomorphic graphs and then analyze the structure
of the graphs of each class. To answer the second question, one certainly needs
to take into consideration the quantitative structure of the Jacobian matrix.
References
M. GILLI, G. PAULETTO
Department d "Econometrie
Universite de Geneve, Suisse
1 Introduction
Qualitative analysis is not new and goes essentially back to Samuelson (1947)
who used it in comparative statistics. The problem has been discussed, among
others, by Basset et al. (1968), Ritschard (1983), Lady (1995) and Lang et
al. (1995). More recently, Artificial Intelligence research in connection with
economic modelling seems be paying a lot of attention to questions related to
qualitative properties in a model (Kuipers, 1986; Iwasaki and Simon, 1986;
Fairley and Lin, 1990; Berndsen, 1992).
We will use a graph-theoretic approach, which proves to be particularly ef-
ficient when dealing with the sparse matrices representing the linearized model.
Moreover, such an approach will provide interesting information about struc-
tural properties of the model. Among others, it reveals the existence of quali-
tatively linked variables, i.e. pairs of variables which either always vary in the
same direction or always vary in opposite direction.
To clarify notation, let us consider a model, formally represented by the
system of n equations
(1)
where y and z are the vectors of endogenous and exogenous variables respec-
tively, (3 is a vector of np parameters and f is an error term.
Deterministic simulation is then the period by period solution of this equa-
tion system with ft == 0 and conditional to the parameters (3, the exogenous
138
D=B-I (3)
(4)
The reduced form of the deviation model is then suitable for analyzing the
dynamics a (matrix D-l E), the multipliers (matrix D- 1 F) and the param-
eter perturbation (matrix D-IG). Matrix D-l, sometimes called the shift-
multiplier matrix, is common to all three problems, and we therefore will focus
our attention on it.
Our aim is to determine the sign of the elements of matrix D- 1 , given only
the sign of the elements of matrix B, where we recall that D = B-1. Thus,
for an element d ij , we define:
~{
if dij > 0
';gn(<I;,) : if d ij < 0
if dij = 0
Yl +
Y2 +
Y3 +
Y4 . +1+1 .
Ys +
Y6 +
Y7 . +1-1 . +1 .
YB +
yg + +
YI0 +
YIIL-________~__~+~~
VI Y2 V3 Y4 Y5 Y6 V7 VB Y9YIOYll
Figure 1: Matrix B.
to the parameters of identities. For these parameters, the interval has thus
been reduced to a particular value. This first and very trivial reduction of a
parameter's interval can be easily justified, as any deviation from such a value
is meaningless.
We now associate to the model defined by matrix B an oriented graphb
GB = (V, U). The set of vertices V corresponds to the endogenous variables
and the set of arcs U is given by the non-zero entries of matrix B, i.e. to a non-
zero entry bij in matrix B corresponds the arc j ---4 i in the graph G B. Figure 2
shows this oriented graph, where the arcs corresponding to the coefficients in
the identities are valued +1 or -1. According to what is reported in figure 1,
we have for U3 a negative sign and for all other Ui a positive sign.
This graph will help us take advantage of the sparse structure of matrix
b A detailed discussion about the use of graphs in analysing complex systems is given in
Gilli (1992; 1995).
140
2 Symbolic computation of D- 1
In order to be able to find the sign of the elements of the inverse of matrix
D, we will compute them symbolically. These symbolic expressions will in
the following possibly enable the identification of necessary restrictions on the
interval of the parameters. A graph-theoretic approach for the computation of
the elements of matrix D- 1 is particularly well suited for taking advantage of a
sparse matrix. According to the structure of the graph associated to a matrix,
there exists a variety of formulations for the expression of the determinant and
the cofactors. A detailed presentation of such formulas for the computation
of the determinant as well as the cofactors, involving paths and circuits of the
graph representing the matrix, is given in Maybee et al. (1989).
We now introduce the notation used in all the subsequent developments
involving determinants and cofactors. We consider a matrix D and its corre-
sponding graph GB-I obtained by adding a loop of value -1 to every vertex
of graph G B. A sequence of adjacent arcs going from vertex j to vertex i is
a path, for which we use the notation /.L~, where k is the index for this path.
The length of path /.L~ , i.e. the number of arcs in sequence from j to i, is then
denoted by lk. The particular path, where vertex i is starting- and ending-
vertex, is called a circuit and is denoted by 4. All paths, and of course circuits,
are assumed elementary, i.e. they do not go twice over the same vertex. In
the following, we will use indifferently the notation /.L~ for the k-th path going
from vertex j to vertex i, as well as for the set of arcs forming this path. The
same remark holds for a circuit ci.
Given a path /.L~, we denote P{/.L~} as the
determinant of the subgraph obtained after deleting all vertices belonging to
path /.L~.
For the computation of the determinant, we will use its expansion in terms
of the principal minors of the matrix. Let us consider an expansion relative to
a given vertex i in the graph representing matrix D. Let {ci, ... , c~} be the
set of all circuits to which vertex i belongs. We then have c :
q
det{D) = ~)_l)lk+1 P{ci} II u (5)
k=l
3 Condensation of vertices
The formulas that are used to evaluate the determinant and the cofactors,
require the enumeration of elementary circuits for the determinant and of el-
ementary paths for the cofactors in the oriented graph G B-1 associated to
matrix D = B-1. The complexity of such a task can be reduced if it is
possible to condense the graph G B before resorting to the graph G B-1.
The general situations which allow operating a condensation of the vertices
in graph G B are the following:
" .!:!.)
-::::i_j~
~
i.e. the existence of a vertex verifying only one outgoing arc, situation a),
or only one ingoing arc, situation b).
In both cases, vertex i will be dropped and each path of length 2 crossing
vertex i will be replaced by an arc corresponding in value to the product of the
two arcs forming the path. If parallel arcs are generated, they will be replaced
by a single arc, the value of which corresponds to the sum of the parallel arcs.
The condensed graph may again contain vertices verifying situation a) or
b), and the same rules for the elimination of a vertex i will be applied. Thus,
the condensation is made in K steps, where K is the number of vertices which
can be dropped from the original graph. For a condensed graph of step k, i.e.
after the elimination of k vertices, we will use the notation G B(k) and B(k) for
its associated matrix. We now need to know how determinants and cofactors
in the condensed matrix B(k) - I are related to those of matrix D = B-1.
142
where ()ij and ()~7) are elements of the transposed cofactor matrix of matrix
B-1, respectively matrix B(k) - I.
P1?of Given situation a) or b) in graph G B we consider the partition
eM
{ci, ... , U {s,+ l' ... , ~} of the set of all circuits going over vertex j in
graph G B-1, so that all p circuits in the first partition include vertex i and
all q - p circuits in the second partition exclude vertex i. Due to the loop on
vertex j, we have q ~ p + 1. The circuits in the second partition verify
P{c{}=(-l)P{c{Ui} k=p+l, ... ,q
because vertex i, in the subgraph corresponding to P{c{}, is involved in only
one circuit, i.e. a loop of value -1.
We now examine graph G B(1), where vertex i has been condensed into
vertex j and parallel arcs have been preserved, in order to have the same
number of circuits in G B - I and GB(I)_I. The set of all circuits going over
vertex j in GB(I)_I is {c{, ... ,q,} U {c;,+1' ... ,~}. Denoting by lk and lk
the lengths of circuits c{. and c{ respectively, and according to the rule for
condensation, we have
Parallel arcs are replaced by a single arc representing their sum. For
instance, there is now an arc Y4 U~5 Y7 which replaces the paths Y4 ~
1 d Us -1
Y5 ----. Y7 an Y4 ----. Y6 ----. Y7·
Continuing to apply successively the rules a) and b) for condensation, we
obtain the condensed graph GB(8). Figure 4 gives the graph GB(8)-I associated
to matrix B(8) - I. The determinant and the cofactors corresponding to the
T1 = -1 + '1.£3('1.£1 + '1.£2)
T2 = '1.£11('1.£1 + '1.£2)
T3=u4-US
T4 = '1.£8
TS = '1.£9 +'1.£10
T6 = '1.£6-1
T7 = '1.£7
For the cofactors associated to the vertices, which have been dropped during
the condensation process, we can show that they are simple functions of the
cofactors of the condensed graph.
Proposition 2 For two vertices i and j satisfying the rule a) for condensation,
i.e.
........ 'Un ~
?i-j",,"
Proof. To compute ()pi, we need V4,j U U a , ... ,J-L~j U u a }, the set of all paths
going from vertex i to vertex p. The length of the k-th path J-L~j U U a is lk + 1.
The determinants P {J-L~j U u a } for k = 1 ... , s verify
= Ua L)-I)ldl(-I)P{J-L~j} II U
5 Formulation of constraints
which defines the sign of the divisor in (15), and therefore we admit that
For our example, we will now compute the elements (Jij and the determi-
nant of matrix D = B-1 by resorting to the reduced graph G B(8)-1 given in
figure 4. According to definition (8), we have det(B - I) = (-I)Bdet(B(B) - 1).
Due to the small size of matrix B(B) - I, these elements can be easily com-
putede and we give them in the following table, which is a submatrix of matrix
D:
Y4 Y7
Y4 -r6 r2 + r7r5
Y7 r3 -rl - r5r4
Y9 r3r7 - r4r6 r4r2 -r7r l
C2: u6<1
from which it then follows that sign(r6) = -, and sign({)Y4,Y4) = +.
Let us now resume these results in the following matrix, where it is indi-
cated which constraints are necessary to sign a given element in matrix 1)
Y4 Y7
Y4 +c2 +
Y7 - cl ?
yg ? +
The qualitative links between endogenous variables established in section 4
partition the elements of matrix 1) into eight classes of qualitatively linked
variables. These classes of variables are shown in figure 5.
To fill in all the elements of the matrix shown in figure 5, we need to
compute only two additional elements, which are {)Yl>Y4 and ()Yl>Y7' To com-
pute them, we use a condensed graph containing vertex Yl, which is shown in
figure 6. Using the definition (6), we easily compute the symbolic expressions
given hereafter
Y4 Y7
Yll~_____r~3U~l~l~-
__r~6_U~3____~_r~5_r7~U~3~-_U~l~l~(r~4~r~5~-
__1~)~
148
Y4 Y2 Y3 YI YIO Y9 Yll Y7 Y6 Y5 Ys
YI il YloY4 il YI 'Y7
Y2
Y3
Y4 il Y4 'Y4 il Y4 'Y7
Y5
Y6
Y7 il Y7 'Y4 il Y7 ,Y7
Ys
yg il Y9 'Y4 il Y9 'Y7
YIO
Yll
and, given the constraints defined above, we obtain the following signs for these
elements:
YI
Y4 Y2 Y3 Yl YIO Y9 Yll Y7 Ys Ys Ys
Yl + + + 1 + + + 1 1 7 1
Y2 + 7 + + + + + 7 7 7 7
Y3 + + 7 + + + + 7 7 7 1
Y4 - - - - - - - - + - -
Ys - - - - - - - - + 7 -
Ys - - - - - - - - 7 - -
Y7 + + + + + + + 7") 7") 7") 7")
Ys + + + + + + + 7") 7") 1") 1")
6 Further decomposition
The more a model increases in size and complexity, the less it will be possible
to conclude about its qualitative responses. In the following, we suggest a
further decomposition of the problem, which is likely to facilitate this task.
Let us consider a matrix D as defined in (2) which is undecomposable, i.e.
which cannot be put into a block-triangular form. We then decompose matrix
D into a sum of matrices
D = (R-I)+Q (18)
where matrix R is such that R - I can be put into a block triangular form.
Considering flYt-l == 0 and fl(3 == 0, expression (2) becomes
which can be considered as the equilibrium relation for the following underlying
dynamic model
(R - I)fly.,. = -QflY"'-l + Fflz (20)
The response of this model after n iterations is given by the familiar convolution
formula:
7 Concluding remarks
References
M. FALIVA
Istituto di Econometria e Matematica per le Decisioni Economiche
Universitd Cattolica, Milano
In this paper it is shown that matching Hadamard product algebra with graph
and system theoretical arguments renders it possible to shed new light onto a basic
econometric issue, namely the analysis of a model's causal structure. After out-
lining the problem, the paper develops an efficient mathematical toolkit, involving
advanced algebraic topics giving several new results. This leads to a clearcut un-
derstanding of the causal and interdependent mechanisms associated with large
econometric models.
y =ry+Az+g (1)
g rv N(o,:E) (2)
t ~ I [ 1 '4-----....
Figure 1: The model as a closed-loop system
Since, due to
r = [I, A] . [ ~ ] (5)
the matrix r plays the role of system's feedback factor, the model's causal
structure actually turns out to depend crucially on the structure of the eigen-
values (Ah) and the left eigenvectors (p' h) of r. The point becomes clear
looking at the set of implicit auto-feedback single-equation relationships:
(6)
154
which ensue from (3) by premultiplying both sides by the eigenvectors of the
matrix r.
By inspection of (6) the following conclusions, regarding the causal or
interdependent nature of the model, can be easily drawn:
a) whenever all the >'~s turn out to be zero, which is tantamount to saying
that r is nilpotent, the feedback rebound - as evoked by the block di-
agram of Figure 1 - is only apparent and the equation system is of the
recursive (causal-chain) type;
b) if the >'~s no longer vanish, then the matrix r turns out to be either de-
composable, with the feedback mechanisms operating at a local level and
a model causal pattern with block-recursive features, or indecomposable,
with the feedback mechanisms operating at a global level and a model
causal pattern with interdependence features.
e'lrJ~ "('
Jlrel g
JlrJ~ rl
Simple computations show that
ele'l + J~Jl = I (i)
e'lr = e'rJj.Jl = "('Jl (ii)
e'I(I - r)-lel = {1- ,,('(I _ rl)-lg}-l (iii)
Jl(I - r)-lel = (I - rl)-l . ge'l . (I - r)-lel (iv)
where (iii) and (iv) arise from well known partitioned inversion formulas (see, e.g., FaJiva,
1987). Let us now split the equation system (3) as follows:
(v)
mirrors the direct links from the RHS to the LHS endogenous variables, while
the positive integer powers of its transpose mirror the specular links among
such variables, i.e. the direct and indirect feedback rebounds.
From inspection of the zero-one pattern of the term-to-term product of
the adjacency matrix and of (the integer powers of) its transpose, it will then
be possible to gain a neat perception of the recursive and of the interdepen-
dent mechanisms operating in the model and, in short, of the model's causal
structure.
In order to master the issues raised so far we need an appropriate analytical
framework and toolkit, a topic to which is devoted the subsequent section.
A*B -- [a··
>J b··]
>J (10)
iii) (A + B) * C = A * C +B *C
(11)
e All matrices are supposed to have the appropriate dimensions and rank so that the
operations make sense.
157
(12)
(14)
where en(N) is the n-th elementary N x 1 vector. In fact the following equality
holds:
IN(A®B)J'M =A*B (16)
for any pair of N x M matrices A e B.
JJ' =1 (17)
(23)
if aij = 0
(25)
otherwise
(30)
B~A (31)
and the indicator matrix ofB is neutral towards A, then the matrix A is said
to be nested into Band B is said to majorize A.
Proof. The invariance requirement - except possibly for the order - of the
diagonal entries of a matrix A under a similarity transformation, by a similarity
matrix B, can be stated, in algebraic terms, as follows:
J. vec(B- 1AB) = PJ· vecA (34)
where P is a permutation matrix and J is the matrix defined in (15).
According to a well known relationship among vec operator, conventional and
Kronecker matrix products, (34) can be rewritten as:
J. (B' ® B- 1 ) . vecA = PJ· vecA (35)
Since A is arbitrary, condition (35) implies that:
J. (B' ®B- 1 ) = PJ (36)
Some computations, bearing in mind (21) and (22) above, show that equation
(36) holds true iff:
B' = PD, with Db = I (37)
and thus, in particular, when B' coincides with the permutation matrix P. 0
ilf two matrices are cogredient so are their indicator matrices.
161
The following theorems consider the issue of detecting the location of null
and non null entries of rational functions of matrices, and thus can provide
valuable information on the structure of the underlying indicator matrices
(Faliva, 1983).
aA+f3B (39)
Formally:
S ~ (aA + f3B)b (40)
for arbitrary A, B, a, f3 with the equality occurring if:
(41)
Proof Inequality (40) follows from (26) and (27) in a straightforward man-
ner. Concerning the latter part of the theorem, observe that under (41) the
following holds true for the entries of (39).
aaij + f3b ij = 0, if both aij and bij are zero, (42)
{ aaij + f3b ij =F 0, otherwise,
and thus (40) will be satisfied with the equality sign. o
162
AB (44)
Formally:
II ;:: (AB)b (45)
for arbitrary A, B, with the equality occurring if every vector:
Proof. Inequality (45) follows from inequality (28). Regarding the latter
part of the theorem, observe that under (46) the following holds true for the
elements of (44):
e'I(L)ABen(N) = 0 if Cl n = 0,
{ e'I(L)ABen(N) =I- 0,
(47)
otherwise,
(48)
where the scalar ao, an, ... , aN-I, f3o, f3n, ... , f3 N-1 are rational functions of
the coefficients of the characteristic polinomial of 1 - A (see, e.g., Rao and
Mitra, 1971; Miller, 1987). By repeated application of rules (26) and (27) we
get:
(52)
holds true when A is a stable matrix, and all terms are non-negative if such is
A. Hence, by referring to Theorems 7 and 8, we get:
(54)
On the basis of these premises we can now establish the following theorems
which play a significant role in sorting out the questions raised in Section 1.
(60)
For n = 0, (61) is trivially true. For n > 0, observe that, since C is nested
into A, bearing in mind Theorems 3 and 4 an Corollary 1, R turns out to
165
be neutral towards CP Aq, where p and q are non-negative integers such that
p+q < N.
Now observe that:
but:
C'(Cr-IA S) = A'*R*(Cr-IAS)=A'*(Cr-IAS)=
= A' * (C T AS-I) = A' * (C r As-I) * R = (63)
= A' * R * (C TAS-I) = c' * (CT As-I)
which implies:
(64)
Repeated application of the argument above leads to prove (61) and, in turn,
statement iii). 0
(65)
C=A*R' (66)
Theorem 11 Let A be a hollow matrix and R the matrix defined by (48). If:
A*R' = 0 (68)
then A is nilpotent.
(69)
(70)
Since all the arguments of the trace operators in (71) are non-negative matrices,
equality (71) implies that:
Theorem 13 If:
A * (I - A,)-I = 0 (73)
then:
(I - A)-I * 1 = 1 (74)
{h (I - A,)-I} . u = u (76)
y = ry+Az (78)
Splitting the matrix r into a nilpotent term \)! and a cospectral term C as
shown in Corollary 3, our reference model can be written as:
y = Cy + \)!z + Az (79)
where:
c=r*R (80)
\)! = r * (U - R) (81)
c*r=o (82)
Rewriting (79) in the form:
[~l
[ I, A ] t-----1~~ .----I~ Y
~I [~j 1.--..'
Figure 2: The model as a multiple closed-loop system
a) from a graph perspective, the splitting of the indicator matrix r b into the
Hadamard-orthogonal pair 'lib and C b corresponds to distinguish, within
the oriented graph associated to our model, the simple paths from the
circuits m.
IThe converse is not true: the class of matrices A satisfying (77) turns out to be somewhat
broader than the class of hollow nilpotent matrices.
m Actually, the (non-zero entries of the) indicator matrix rb reflects the direct links from
the endogenous variables on the right-hand side to those on the left-hand side of the system.
Conversely, the transpose matrix (rb)' shows the direct links in the opposite direction and
its integer powers reflect the set of the indirect links.
The binary matrix:
thus collects all the basic information on the overall (direct and indirect) links connecting
the left-hand side endogenous variables to the right-hand side ones.
169
b) from a system perspective, the splitting of the feedback factor r into the
matrix pair C and \]! corresponds to separate the effective feedback loops,
with the appended interdependence meaning, from the unidirectional
links among variables, with the respective causal meaning n.
Y1 0 0 0 0 0 0 Y1
Y2 1'21 0 0 1'24 0 0 Y2
Y3 0 1'32 0 0 1'35 0 Y3
Y4 0 0 0 0 1'45 1'46
+ Y4
+
Y5 0 0 0 1'54 0 0 Y5
Y6 0 1'62 0 0 1'65 0 Y6
au 0 0
0 a22 0
[
Z1
a31 0 0
+ Z2
0
a51
a42
0
a43
0
Z3 1
0 a62 a63
nFor what concerns the structure of the matrix C observe how (see Faliva, 1992):
0 0 0 0 0 0
'Y21 0 0 0 0 0
0 'Y32 0 0 'Y35 0
'1!= 0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 'Y24 0 0
0 0 0 0 0 0
C=
0 0 0 0 'Y45 'Y46
0 0 0 'Y54 0 0
0 'Y62 0 0 'Y65 0
and the oriented graphs corresponding to their indicator matrices r b , '1!b and
C b , are shown in Figure 3.
In the light of the arguments developed up to now the following conclu-
sions - covering graph and system profiles and shedding light on the model's
causal structure - hold true:
* the underlying oriented graph, whose adjacency matrix is r b, does not con-
tain any circuit;
cp
I
I
"
Q).------
Proposition 5 If r = C, then:
Acknowledgments
Support from the Italian Ministry of the University and Scientific Research
(MURST 40% 1994-1995, Faliva) is gratefully acknowledged.
173
Recursiveness
Recursiveness or self-baloncing
interdependences
Block recursiveness
no
Interdependence
References
Miller, K. S. , 1987. Some Eclectic Matrix Theory, Krieger Pub!. Co., Mal-
abar Flor.
B. ZAVANELLA
Laboratorio Statistico-Informatico
Universitd degli Studi di Milano
1 Introduction
Phase III deals with a traditional comparison between price and quantity
levels, observed in each country. The axiomatic theory of index number
177
is applied in this phase (Martini, 1992)j its main definitions and concepts
are summarised in appendix A. Graph theory turns out to be a powerful
tool to identify the optimal minimum path arising in the construction of
a multilateral system of index numbers satisfying the imposed coherence
conditions (see appendix A).
etc. For this reason the research of the optimal set for the construction of
the optimal graph is very complex. The optimal set to construct the mixed
system, formed by (k - 1) pairs, can be univocally identified among all the
others by imposing the further condition of a minimal structural dissimilarity
within each pair of situations.
That condition, among other properties, allows to reach the main goal
a mixed system is built for: the safeguard of the identity property, in those
comparisons where it is required, by virtue of similar structure in the countries
compared. The Bortkiewicz formula (Bortkiewicz, 1922) (see appendix A):
(2)
1) the diagonal elements are zeros, for dissimilarity between a situation and
it.self is zero;
1) the first two pairs must be chosen; the transitive indices for this two pairs
are set equal to t.he corresponding direct indices, that is: Ptib = p t / b;
2) all the possible indirect indices are built., as in equation (2), by linking
t.ogether the direct indices of t.he chosen pairs;
3) the t.hird pair is selected if and only if it has not been already· indirectly
compared in step 2);
4) the procedure ends when all the sit.uations have been considered at least
once in the direct comparisons; if every step is correctly execut.ed, the
pairs selected for t.he direct comparison are exactly (k - 1).
179
A B C D
A B C D
The procedure assures the identity of the price index for those pairs of
situations where the conditions of equality or prices proportionality subsist,
implying Bortkiewicz indices close to zero. An example will show the choice
procedure described above.
Let us compare four situations A, B, C, and D by means of a mixed
system. The related Bortkiewicz and Fisher matrices are in Table 1 and Table
2 respectively. The ordered Bortkiewicz values are in Table 3.
Note that "*,, in Table 3 indicates the three pairs chosen for direct compar-
ison. The first two pairs are chosen as usual, the third pair is rejected because
the transitive index P;jb has already been computed by linking together the
indices P;ja and p;/a; the fourth pair is chosen as it includes the situation D
in the system. At this point the objective has been reached and the procedure
can be stopped. Therefore the mixed system matrix is as in Table 4, where
bold character indicates indices calculated by using the direct formula, whereas
the others are obtained as transitive indirect indices:
P'B/A = PB / A = 1.010
PC/A = PC / A = 0.870
180
b t Bt/ b
A B* 0.05
A C* 0.15
B C 0040
B D* 0.85
A D 0.90
C D 0.95
A B C D
P'D/B = PD / B = 2.810
P'D/A = PD / B / PA/ B = 2.810/0.990 = 2.838
PC/B = PC/A/PB/ A = 0.870/1.010 = 0.861
P'D/c = P'D/A/ PC/ A = 2.838/0.870 = 3.262
The indices in the lower triangle of the matrix in Table 4 are found com-
puting the reciprocal of the corresponding indices lying in the upper triangle,
that is by using the base reversibility property of the Fisher index. The method
suggested by Martini is easily applicable if the number of situations is small;
on the other hand, when the number of situations increases, it becomes very
hard to decide whether or not a pair has to be included. If the set of situations
to compare is high (for example the k=12 members of the EEC in 1990, the
present k=15 EU members, the k=24 members of OECD), the choice of pairs
to compare requires a few steps. The choice can be performed by applying
181
Graph theory can help to choose in the mixed system the pairs to be compared.
We associate to the Bortkiewicz matrix a weighted digraph. With reference to
the previous example the digraph can be represented as in Figure 1.
0.05
~----------Q9-j--------~
and it is equivalent to limit the analysis to the upper triangle of the matrix,
as in the previous section. The graph (C) is a complete graph, because each
pair of nodes is joined by an edge.
To solve the optimal minimum path problem we need some requirements
on the subgraph (D); afterwards it is possible to give an algorithm which
enables its construction. The optimal minimum path can be represented by a
subgraph of the complete graph found under the following conditions:
0.15 0.85
graph, because the nodes have to be mutually reachable; this implies the
existence of a path joining all nodes pairs as in Figure 4;
4) the spanning subgraph must have no circuits, because it is not necessary
to compare directly pairs of situations already indirectly compared;
5) the edges to be inserted in the tree must have a weight as small as possible.
If (C) = (N, E) is a connected graph, where N is a set of nodes and E is a
set of edges, then a spanning subgraph (D) = (N,X) of (C) with no cycles, is
a tree that connects all the nodes in N. The cost of a spanning tree is simply
the sum of its weights.
The subgraph (D) is a minimum cost spanning tree and will be called
minimum optimal gmph in the following.
In order to obtain data in increasing order it is necessary to apply first a
sorting algorithm to the elements lying in the upper triangle of the matrix. The
objective is to find a spanning tree of minimum cost. The Kruskal algorithm
is used here (Kruskal, 1956), which is characterised by the following steps (see
Kingston, 1990: p. 257)
Let Q, X and Y be sets of edges
X=O
Y=O
Q = E (sorted in increasing order)
end;
end;
return < N,X >;
end K ruskal;
X and Yare empty at the beginning; when the algorithm ends, every edge
of E is either in X or Y. The edge (n, m), deleted from Q, is inserted in X
if nand m lie in different components; this means that there is no a path
(n, ... , m) in (N, X). On the other hand, the edge (n, m) is included in Y if n
and m lie in the same component of (N, X).
This section deals with the optimal minimum path construction for the 12
EEC countries. Table 5 contains the Bortkiewicz values for EEC sorted in
increasing order. The complete graph is in Figure 5.
The graph includes 12 nodes and 66 edges. Note that the weights assigned
185
IRL
Figure 5: The Complete Graph. Legenda: D: Germany, F: France, I: Italy, NL: Netherlands,
B: Belgium, L: Luxembourg, UK: United Kingdom, IRL: Ireland, DK: Denmark, GR: Greece,
E: Spain, P: Portugal.
to each edge are not included in the figure. The resulting mixed system optimal
graph is in Figure 6.
The Bortkiewicz value is reported on each edge of the graph. The optimal
graph shows the central position of Germany. Ireland and Spain also have
many links with other countries. The dissimilarity between United Kingdom
and Ireland is the smallest one. Central Europe countries (except Luxembourg)
are very similar, while Denmark, on one side, and Portugal and Greece, on the
other side, are very far from the graph centre, represented by Germany. Italy
is linked with Germany through France which acts as a bridge, while Ireland
and Spain are the bridges for the North European countries and for the South
European countries respectively.
186
1) prices (Pti);
2) quantities (qti);
x-y
ML(x,y) = In(x) -In(y);
satisfies the monotonicity and the linear homogeneity properties (for the bounds
on the variables see Martini, 1992) and it is bounded by the arithmetic and
the geometric mean. The logarithmic mean of relative values Wt,i and Wb,i is
also computed, in order to weight prices and quantities, since it maintains the
symmetry of the distance matrices; consequently, the weights q)i are:
~._ Wt'-Wb'
,r. ,1.
, - In(wt,i) -In(wb,i)
A complete graph can be associated to each distance matrix and this graph can
be used to construct optimal graphs for the 6 considered variables, by using
the Kruskal algorithm. These optimal graphs are able to supply important
information about links existing among the 12 countries. This graphs are not
included in this paper owing to limited space (see Zavanella, 1993b). More-
over, the complete graphs which refer to the same variables, can be condensed
by observing proper rules so that the searched homogeneous areas are easily
identified. The condensed graph is built in as follows:
2) all the edges are included in the graph to be condensed, starting from the
smallest one until the last country is reached;
188
4) the new condensed node replaces the previous nodes in all the following
distances;
5) the procedure ends when the last country is first included in the condensed
graph for the first time.
8=0.079
6.1 Prices
The condensed graph for prices is very compact; only Denmark, Portugal and
Greece are isolated and three complete components are built. The first com-
ponent is formed by Central European countries. Both the mean distance and
the subgraph variability are very low, this component is therefore very homoge-
neous. The relative variability equals 4.5% of the mean distance. The weights
do not modify the condensed graphs noticeably. It has two nested components
only: the first one consists of the Central European countries, while the second
one contains remaining countries except for Portugal, Greece, and Denmark.
On the contrary, the variability is increased: 11,6% for the first component and
12,6% for the second one. The prices level depends mainly on the productivity
structure existing in the market. Therefore, the results of condensed graphs for
prices highlight an homogeneous pattern in EEC; particularly, in this respect,
Central European countries can be considered as an single market.
6.2 Quantities
In the quantities graph two clearly separated components are originated, while
in the condensed graph Italy remains alone and it acts as a bridge between
those two components. On the contrary, North European countries do not form
any component on their own. The mean distances are higher than they are in
the case of prices: the minimum mean distance is about 3 times the minimum
price distance (the comparison is possible because the distances are dimension-
less). The variability is 8% for the first component and 2% for the second one.
Weights do not alter the condensed graph significantly: UK and DK are still
190
linked with the Central countries, while the southern countries are included
in the condensed graph alone. Variability does not increase significantly too:
10.5% for the first component. The structure of private consumption quanti-
ties is only function of habits and tastes of different peoples. EEC is clearly
separated in three distinct areas: South, North and centre of Europe, where
Italy acts as a bridge between the centre and the South European countries.
The role played by Italy is perfectly coherent with the different pattern of
habits and tastes in the different Italian regions.
6.3 Values
Finally, the distance matrices referred to the values and the relative values are
considered.
The condensed graph of values shows the situation already described for
quantities; the variability is the same too. This happens because the quanti-
ties distances are very high if compared to those of prices. The relative values
condensed graph reflects the distributions of the expenditure rates in the dif-
ferent items which characterise the different European countries. It is very
191
compact; three nested complete components are originated and they have the
usual aspect: the first one formed by Central European countries, the sec-
ond one composed by South European countries and then a third component,
formed by Italy and the first and second components. The variability is similar
to the case of quantities.
7 Concluding remarks
Greece and Denmark) are isolated with respect to prices. On the contrary,
quantities and relative values well represent different habits of consumption
in the different geographical European areas; note that with respect to those
variables, Italy plays a role of bridge between Central and southern countries.
To confirm the quality of results, it is interesting to compare them with those
deriving from some multivariate statistical application techniques (Zavanella,
1993a, 1993b). Cluster analysis and multidimensional scaling give concordant
results. Particularly, three groups of countries have been found, homogeneous
with respect to the grouping variables:
1) Northern countries (Denmark, United Kingdom and Ireland)
Note that, within the groups, three countries behave partly differently.
For example, Italy has an intermediate position between southern and Central
countries as concerns quantities and values; Portugal and Denmark, on the
contrary, tend to detach from the respective groups when the variable consid-
ered is price. Therefore it is possible to conclude that statistical techniques
and graph theory give concordant results.
Appendix
We define:
Ps the column vector of the positive prices Ps,i> referred to a set of n items,
observed in s = 1, . .. , k countries;
qs the column vector of the positive quantities qs,i referred to the same set of
items, observed in s = 1, ... , k countries;
Vs the column vector of the corresponding elementary values Vs,i = Ps,iqs,i;
Bilateral comparison
qt/b is the vector of quantity ratios (or quantity elementary indices) qt/b,i =
qt,dqb,i;
vt/b = vt/~ is the value index; it must be factorized in two positive numbers
pt/bQt/b where Pt / b is the synthetic price index number and it measures
the variation of prices, while Qt/b is the cofactor and measures the quan-
tity variations;
which transforms both the n-dimensional vectors of the observed prices and
the n-dimensional vector of positive weights CP, into a real positive number.
The cofactor function Qt/b is obviously defined as:
Qt/b = Vt/b/ pt / b;
The function pt / b must satisfy the following axiomatic properties:
Strong identity (/) : Pt = Pb = Po :::} F[pt, Pb, cpj = 1
Commensurability (C) : F[3pt, 3Pb, CPj = F[pt, Pb, CPj
3 being the (n x n) diagonal matrix with positive elements ~i on its main
principal diagonal and zeros elsewhere; this property implies the inde-
pendence of the index number from any change in the physical measure
unit of goods;
Linear homogeneity (H) with respect to Pt : a-I F[apt, Pb, CPj = F[pt, Pb, CPj
being a the exchange rate (scalar); this property implies that multiply-
196
ing the prices Pt by the coefficient a, the price index number changes
proportionally.
Strong proportionality: F[>'Pb' Pb, <1>] = >., which follows from strong identity
and linear homogeneity;
Homogeneity of degree -1 with respect to Pb : F[pt, .BPb, <1>] = .BF[pt, Pb, <1>],
which follows from commensurability and linear homogeneity;
Dimensionality: F[apt, apb, <1>] = F[pt, Pb, <1>], which derives from homogene-
ity of degree -1 and linear homogeneity.
Multilateral comparison
1) to build six indices (representing all the possible comparisons among sit-
uations) by applying the same transitive formula for every couple of
countries: in this case strong identity and strong proportionality of the
indices and/or of their cofactor do not hold for each countries pair;
2) to build a mixed system of four direct indices ICH, with cofactor ICH, for
two couples of countries and two indirect indices for the last countries
pair; the two pairs of countries to be directly compared must be chosen
so that the loose of identity be minimised: actually it is important to
choose the two countries in which prices are fairly equal or proportional.
A simple similarity measure of prices (and quantities) is the Bortkiewicz
formula (Bortkiewicz, 1922).
3) when the applied P formula is ICHBF, then the em mixed system requires
the calculation of two direct indices and of one indirect index only; the
other three comparisons (corresponding to the lower triangle of the ma-
trix) can be obtained simply by taking the reciprocal of the calculated
indices.
More generally, if the countries to be compared are k ;::: 3, the mixed system
requires the calculation of (k-1) direct indices ICHBF and of [(k -l)(k -2)/2]
indirect indices, the other ones are obtained as the reciprocals. Obviously,
every country must be present at least in one of the (k - 1) couples to be
198
where:
pPt / b =Paasche index of prices;
LPt / b =Laspeyres index of prices;
LQt/b =Laspeyres index of quantities;
Ippql = (IO"pqI/O"pO"q) =absolute value of the correlation coefficient;
O"pq=covariance between price and quantity ratios (Pt/b,i' qt/b,i);
O"p =mean square error of prices ratios Pt/b,i;
O"q =mean square error of quantities ratios Pt/b,i.
The Bortkiewicz formula is a synthetic measure of the dissimilarity of two
situations t and b; as follows:
- it equals zero when it is Pt = APb and then O"p = 0 and O"pq = 0, or qt = -yqb
and then O"q = 0 and O"pq = 0;
- it increases, when the mean square errors 0" q and 0"p and the absolute value
of the correlation coefficient Ippq I increases;
References
Paasche, M. , 1874. «:Uber die Preisentwicklung der letzten Jahre nach den
Hamburger Borsenmotierungen»Jahrbucher fUr die Nationaloekonomic
und Statistik, Band XXIII, Jena.
Sato, K. , 1976. «:The ideal log-change index number» The Review of Eco-
nomics and Statistics, 58(2): p. 223-228.
Vartia, Y. O. ,1976. «:Ideallog-change index numbers»Scandinavian Jour-
nal of Statistics, 3: p. 121-126.
Zavanella, B. M. , 1993a. «:Comparison of consumption among EEC coun-
tries: prices, quantities and values»Bulletin of the International Sta-
tistical Institute, Contributed Papers, 49th Session, Book 2, Firenze.
p. 571-572
Zavanella, B. M. , 1993b. «:The private consumptions in Europe: prices,
quantities and values.»Internal report, Istituto Scienze Statistiche, Uni-
versita di Milano.
200
This paper is basically a review of definitions and properties of graphs and their
use in statistical modelling. We focus our attention only on what we think is
essential for a good understanding of statistical graphical models. In the last
sections the relative merits of regression and graphical modelling approach are
compared theoretically and by means of an application to real data.
1 Introduction
Since the paper of Wright (1923) the idea of associating the knots (or vertices)
of an oriented graph with continous random variables (r.v.) and its edges with
given measures of correlation and causality, has received increasing attention.
Later on the work of Darroch et al. (1980) showed the existence of a strong re-
lation between log-linear models and certain probability distributions (Markov
random fields) defined on the knots of a graph. The aim of this paper is to
analyze the relation between graphical gaussian models and regression.
We first briefly review the Iterative Proportional Fitting (IPF) procedure
and some basic concepts of graphs theory, then we discuss the relation between
these models and regression theory. In particular we study the conditions
under which the two methodologies have the same capability of representing
the interaction in a set of random vectors.
Before defining graphical models, we need some definitions and properties from
graph theory.
Proposition 1 Two r. vt.s X and Y are independent if and only if there exist
two functions 9 and h such that
a) fYlx,z(Y; x, z) = fYlx(Y; x)
fx z(x, z)
b) fx,Y,z(x, Y, z) = fxy(x, y) ix(x)
relation between knots, then we have to clarify the concepts of boundary and
closure of a set of knots.
The boundary of a set a ~ K (bd(a)) is the set of all knots in K but not
contained in a that are neighbours of the knots in a. More formally we write
K\a to denote the set of knots not contained in a. The closure of a set of
knots, ii, is the union of a and its boundary.
We are now able to state the Markov properties (Darroch et al., 1980).
Proposition 2 Let X = (Xl' ... ' Xk)t be a r. vt. with p.d./. fx(x) > 0
for all x E ?J?k. The vector X is said to be a Markov vector if, given a graph
G = (K, E) associated to it, one of the following equivalent statements is
verified
i) If I is the closure of i E K and K\I is the set of knots excluding all
neighbours of i and i itself, then for all i E K Xi 1.. XK\i I Xbd(i).
ii) For all i,j E K such that i rf j we have that Xi 1.. Xj I XK\(i,j).
iii) If a is a subset of knots in K, Xa 1.. XK\a I Xbd(a).
iv) If two disjoint subsets a and b of K are separated by a third subset d E K
then Xa 1.. Xb I Xd.
The equivalence of this four properties holds while fx(x) > 0, otherwise
we cannot use them interchangeably. The property i) is usually called local
Markov property and it is strictly related to regression models, because the
r.vt. Xi can be explained only by the variables belonging to its boundary in
the independence graph i.e. the variables from which it depends directly.
Property ii) called pairwise Markov property has an important role in the
development of gaussian graphical models. In fact these models are based
on the multivariate normal distribution which takes in account only pairwise
interactions. Then using this property we can easily build the independence
graph associated to such models.
where Vaa is the covariance matrix of the r. vt. X a , Vab is the matrix of
covariance between Xa and Xb and analogous definitions hold for V ba and
Vbb (usually Vab = Vba). Then Xa and Xb are independent if and only if one
of the two following condition is true
i) Vab=O
ii) Dab = O.
Proposition 4 Let X a , Xb and Xc be three r. vt.s with multivariate normal
joint p.d.f.. Under the same assumptions of Proposition 3, Xb ..1 Xc I Xa if
and only
Ai; our main interest is the estimation of the covariance matrix, we set the
mean vector equal to its maximum likelihood estimate (m.l.e.), i.e. m = y, so
that expression (4) simplifies to
SS(fllg) = r
J!Rk
fx(x) log fx((x))dX
gx x
Notice that SS is not a distance being not symmetric. Usually SS is used
to assess the quality of the approximation of gx to fx and it becomes a good
way to study the convergence of an iterative procedure for the estimation of a
p.dJ..
207
In the gaussian case <;S has a very simple form. Consider two normal p.d.f.,
fx(x) and gx(x), with the same mean vector and covariance matrices VI and
V 2 respectively, then
(8) depends only on the two covariance matrices, then we will write
<;SUlIg) = <;S(V 1 1IV2 ). Furthermore it can be seen as the divergence between
two positive definite matrices and used to assess convergence of the IPF. In
order to do that, let us consider some of the properties of (8) useful in this
case.
Let IKI denote the cardinality of the set K and G = (K, E) be a graph.
Let P be the class of IKI x IKI positive definite matrices. Each matrix in P
identifies a normal p.d.f.; recall that a set Q C ~k is said to be a compact set if
given any sequences taking values on Q we can build a subsequence converging
to some Xo E Q.
Property ii) is crucial for the solution of the constrained maximum likeli-
hood system of equations given above.
208
A. fij = d ij if (i,j) E E,
B. fi j = h ij if (i,j) ~ E.
The general algorithm starts setting Fo = H- I and generates a sequence of
positive definite matrices {Fn} belonging to P, and then for n ? 1, working
on the set En" we have:
The idea is to let fixed 2) and to make 1) vary along the iterations. The first
proof of the convergence of this procedure was given by Csiszar (1975). A more
statistical approach is given in the paper of Speed and Kiivery (1986) to which
we refer. They gave the following proposition
3.3 Decomposability
A special role in the theory of graphical models, and in particular in the anal-
ysis of the relations between graphical modeling and regression, is played by
decomposable graphical models. A decomposable graph is one that can be
successively decomposed into its cliques. We will say that a r. vt. X is de-
composable if we can associate to it a decomposable conditional independence
graph. This graph's property has important consequences in terms of general
properties of the models (Whittaker, 1990):
i) Decomposable models are multiplicative, i.e. the p.d.f. of the r. vt. X
can be written as the product of the marginal p.d.f. of the cliques. This
209
iii) Decomposable models are such that their m.l.e. can be computed di-
rectly. For example the IPF converges in just one cycle.
Property iii) clearly, makes easier to handle this kind of models as the maximum
likelihood system of equations can be solved directly. This is a consequence of
property i), i.e. of the complete factorization of the p.d.f. of X.
4 Model Choice
covariance matrix V, its m.l.e is the sample covariance matrix S. Then let us
compute the log-likelihood difference to compare V and S, we obtain
The forward procedure works in a similar way, starting from the minimal
graph and stopping when all the edges added to it are significant.
Remark that the two selection procedures are perfectly symmetric and
then they usually give the same answer.
of MIM. We fit and test through the likelihood ratio test, all the models we
obtain deleting an edge from the base model. Then the least significant edge is
removed. The significance level is taken to be 5% through the entire example.
The fitting procedure ends when we find only significant edges.
For the SSE sample, we denote by Y = (Y1 , ... , Ys) the r. vt. of observa-
tions and we proceed in the same way as for the SSE sample.
In turns out that, while for SSD all the remaining edges are strongly sig-
nificant, for SSE the links between subjects are never very strong and we are
forced to keep two not higly significant edges in order to explain the realtions
between the r.vt ..
The final results are collected in Table 1.
In both cases we obtain two meaningfull graphical models and their graphs
are in Figure 1. The edges between Y 5 and Y 6, and Y2 and Y 3 in graph (b),
are given by dotted lines because of the weakness of the linkage.
From graph (a) we can conclude that the eight subjects considered con-
stitutes a rather homogeneous set. In fact each knot has no more then three
neighbours and then there are no "principal "subjects.
Graph (b) is decomposable; the vector Y can be decomposed in the fol-
lowing way: 1'4, Y7, Y s , (Y2, Y 6 ), (Y5, Y6 ) and (Yl, Y 2, Y 3 ). Its p.d.f. factorizes
as
fy(y) = !(Y4)!(Y7 )!(YS)g(Y5, Y6)h(Yb Y2, Y3)g(Y6, Y2)
!(Y6)!(Y2)
where all !(.) are univariate normal p.d.f. and g(.,.) and h(.,.,·) are bivariate
213
® I
I
I
I
I
I
I
I
I
(a)
® ® (b)
and three variate normal p.d.f. respectively. The joint p.d.f. is a multivariate
normal.
In graph (b) (Figure 1) we have three marginal independence relations
and a conditional independence between the given probability of statistics and
mathematics subjects, subject 1'2 can be seen as a "separation "knot.
Notice that the decomposability of SSE graph implied a sensible reduction
in the computational time employed by MIM.
In the previous paragraphs we used IPF to fit the model. Now we analyze
the same set of data by means of regression. Our aim is to verify under
which conditions the two methods have the same capability of representing
the interaction structure between r.vt ..
Denote by X(i) and Y(i) (i = 1, ... ,8) the vectors X = (Xl"'" Xs) and
Y = (YI, ... , Ys ) without the i-th component. In regression analysis we have
two groups of eight equations each:
E(Xi I X(i») = aiO + L aijXj and E(Yi I Y(i») = biO + L bijYj i = 1, ... ,8
j~ j~
and E denotes the expectation taken with respect to the conditional distri-
butions of Xi given X(i) and of Yi given Y(i) respectively. To estimate the
parameters of both systems we apply the reg procedure of SAS, and the back-
ward selection to choose the model, being the latter similar to the backselect
214
procedure of MIM. The significance level is always 5% and at each step the
choice of the variable to be removed from the conditioning set is based on an
F-test with 1 and n - 2 degrees of freedom (n is the samples size).
The results of IPF and regression analysis agree only for the SSE sample.
In the other case the outcomes are completely different, in other words, the con-
ditional independence relations enligthed by the regression analysis of the SSD
sample, are different from the relations given by the graphical model fitted by
IPF. This is mainly due to the different "starting" points of the two method-
ologies. Regression considers conditional distributions to represent relations
between r.vt., while graphical models take in account the joint distribution of
the r.vt .. This implies the use of different kind of conditional independence
graphs for each method.
Conditional distributions imply some idea of causality relations between
the r.vt., and then the use of a directed graph. Joint distributions give the
same "attention "to all the r.vt. and then we associate to them undirected
graphs.
It means that to compare graphical models and regression analysis, we
have to compare undirected and directed graphs. In order to do that we have
to introduce and discuss properties of directed graphs.
i) i -< j or j -< i;
215
iii) if i -< j and j -< h then i -< h (the -< relation is transitive).
The -< relation garanties that each edge of the graph can only have one direc-
tion. We will say that if j -< i, j belongs to the past of i and we denote by
K(i) all the elements of K belonging to the past of i and i itself, i.e. the union
of the present and of the past of i. Now we are able to define the directed
independence graph (Whittaker, 1990):
where Kx and Kn are called set of exogenous and endogenous knots respectively;
the edges in E~ are lines, while the edges in E;' are arrows, more precisely they
are given by ordered pairs of vertices (i, j) with j E Kn.
We denote with i - j and i - j an undirected and a directed edge respec-
tively. If there are no oriented cycles (an example is in Figure 3)
then the causal graph is recursive.
Again in order to extend the Markov properties to this kind of graphs, we
consider GUo built by changing all the directed edges in E;' into undirected ones
217
6.3 Recursive systems and their analogies with graphical gaussian models
where .Bij.a and G'jj.a are the partial regression coefficient and the residual
variance of the j-th variable on the i-th one eliminating all the variables with
indices in set a.
This factorisation of D, denoted by (L,"IlI, <1» or (C, B,"IlI, <1», has been
introduced in order to obtain a faster way to analyse the relations between
variables. Let us introduce an ordering w in the vertex set of the recursive
causal graph GC such that w( i) < w(j) when j E Kn and i -+ j.
Let us suppose that the random variables are indexed by the vertices of GC
and that (Y, X) has joint Normal p.d.f. Pv, with zero mean and covariance
matrix V.
Proposition 9 The distribution Pv, of the r. vt. (Y, X) verifies the equiva-
lent Markov properties (Darroch, et al., 1980) if and only if for every ordering
of K compatible with GC, the elements of the factorisation (L,"IlI, <1» satisfies
the constraints
the role of endogenous variable is played only by Yi. Then we consider a system
of q equations, i.e. the q relations of marginal conditional independence.
Before going further in the analysis of the relations existing between re-
gression and graphical gaussian models, we state the following lemma which
describes the connection between our approach to recursive systems and the
well-known one used in econometrics.
(9)
The study of equivalence between the analysis of graphical models and re-
gression, can now be done with respect to the sample from students of SSE,
because only the graph associated to SSE is decomposable and then its p.d.f.
can be uniquely factorised.
220
IV
Figure 4: Recursive causal graph of SSE
Let us introduce on the vertex set of the graph an ordering compatible with
the construction of a recursive system. Instead of Y = (Y1 , •.• , Ys), we con-
sider Z = (Zl ... , Z8) where: Zl = calculus II, Z2 =geometry, Z3 =probability,
Z4 =statistics II, Z5 =statistics I, Z6 =calculus I, Z7 =methodological statis-
tics and Z8 =sampling theory.
Then the SSE causal graph is as follows:
and Zl is the only exogenous variable, while Z2, ... , Z8 are endogenous (that
is p = 1 and q = 7).
This graph presents neither Wermuth configurations nor oriented cycles,
then the conditional independence statements contained in the undirected and
the directed graphs are the same. The graph is recursive, as we could expect
since this property is just a consequence of decomposability. The associated
system of equations is
Z2 = 021 Z 1 + U 2
Zl = U1
Notice that the ordering we gave to the subjects, allows the IPF to converge
in only one cycle .
Here, again, the recursive system is estimated through the backward option
221
P-VALUE: P-VALUE:
SSE EDGE
RECURSIVE SYSTEM GRAPHICAL MODEL
of reg procedure of SAS and the fixed significance level is 5%. Thanks to
Proposition 10, the drawing of the independence graph is based on the null
partial regression coefficients then, looking at the output of SAS, we have to
take in account only the significance tests made on such coefficients. Through
backward procedure only the variables, whose associated coefficient is different
from zero in a significant way, remain in the covariate set.
We obtain the same graph seen in paragraph 5; infact, for uniformity, we do
not delete the two not highly significant edges (linking statistics II to statistics
I and geometry to probability). The results of the analysis of the recursive
system are collected in the following Table 1. They are also compared with
the P-value obtained through the analysis of graphical model.
As in this case the conditions on the equivalence of causal graphs and
undirected graphs are satisfied, and furthermore, the graph is decomposable,
the two methodologies give the same results, that is both methods are able
to represent the interaction structure of the variables. Notice that the least
significat edges of the graphical models are still weakly significant and their
regression P-value is even bigger then the one obtained by graphical models
analysis.
The sample from SSD has not been considered because its graph is not
decomposable. Infact decomposabilty (by itself) is necessary to allow us to
introduce an ordering system on the vertex set in order to simplify the fac-
torisation of the joint p.d.f.. Furthermore if Wermuth condition is satisfied,
directed and undirected graphs admit the same interpretation in terms of con-
ditional independence.
Then graphical models seem to represent the relations between variables
better than regression because they work on the joint distribution and con-
sequently do not need an ordering in the variable set. Infact for regression
222
References
F. LAGONA
Dipartimenta di Statistica e Prababilitd
Universitd di Rama, "La Sapienza "
Variances/covariances matrices and graphs are useful tools for studying stochastic
interaction among statistical data. In this paper the presence of some latent ob-
servations is modelled using an hypothesis of linear structural dependence among
data. The result is a particular Markovian Gaussian field, described via conditional
densities. The model covers the exchangeable hypothesis as a particular case. As
an application, a statistical linear model with dependent errors is presented and
estimation problems are discussed.
1 Introd uction
Some years ago, Baldessari and Gallo (1982) introduced the concept of linear
structural dependence (LSD) among the components Yi, i = 1,2, ... , n, of an
n-dimensional Gaussian random vector Y. Roughly speaking, they assumed
that each Yi is explained by a linear relation between Yi and n independent
Gaussian variables Ui , i = 1,2, ... , n, with E(Ui ) = 0 and Var(Ui ) = 1 for
each i. For instance, we have an LSD of degree 0 if there exist constants d;,
such that
(1)
In other words, each random variable Yi, i #- 1, does not depend on the
observed values in the set {Yj, j #- 1, j #- i} given the value Yl' In general, if
ai #- 0, j = 1, ... ,k, and ak+l = ... = an = 0, then each Yi, i = k + 1, ... ,n,
does not depend on the observed values in the set {Yi, j E {k + 1, ... , n} - {i}}
given the values in {Yj, j = 1, ... ,k}. The limit case is when all the a's are
nonzero and all the conditional densities f (Yi I{Y; = Yj, j #- i}) are functions
depending on all the values in y.
The conclusion is that the meaning of (2) is linked with the presence of
latent observations Yl, ... , Yk of the random vector Y.
Similar troubles are very common in practical econometrics. For instance,
let us suppose to observe the price levels of the same good stated by n com-
panies. In the quasi-monopolism case, the price levels of n - 1 companies are
independent, given the price stated by one company. In a similar manner, in
the quasi-duopolism case, n-2 companies will have an independent behaviour,
given the one of two companies that interact to each other.
In the following sections, a statistical model is defined for studying data
of an LSD hypothesis of degree one. For this a theoretical statement of the
problem is needed.
where
(4)
where of, J-Li, a are unknown parameter. Let us observe that neighbourhood
data enter the regression function E (YilYj j E N(i)): this is a consequence of
gaussian assumption.
It is easy to evaluate the joint density of Y from (5). Actually, if x and y
are different realizations of Y, we have that
(6)
(7)
where
M d'
= lag (2. 1 )
0i, Z = , ... , n
A = "'D
<..<
D = {D"}
oj
" ..
U tJ
= {I 0 if j E N. (i)
otherwIse
(8)
Formula (7) is consistent with the Hammersey-Clifford Theorem (Besag,
1974) because the negpotential function is
(9)
where
Yig(Yi) = (Yi -/i)2 i = 1, ... , n (10)
o i
YiYjg(YiYj) = - a(Yi - J-Li)2(Yj - J-Lj) i = 1, ... , n, j E N(i) (11)
°i
From (7) we can recognize the normaling constant and evaluate the joint dis-
tribution of Y
f(y) = N (p., (I - A)-l M) (12)
227
(13)
where the joint density of eis N(O, I) and the elements eij of E must satisfy
the following relationships
1 if i = 1
-0 if j E N(i) (14)
o otherwise
The statement (13) explains the dependence among errors through the
linear filter E- 1 M~ which transforms the white noise signal e
in the error
signal e. Condition (14) models this filter through a parameter o. It should
be noted that 0 is an autocorrelation coefficient in the model, because we may
write (5) as
€i = 0 L €j +'l/Ji i = 1, ... ,n (15)
j EN(i)
where 'l/Ji has density N(O, an,i = 1, ... ,n. Thus, multiplying both hands of
(15) for L €j and evaluating the expectation value, one has
j EN(i)
(16)
228
Let us consider the neighbour hood structure {Nh (i), : i = 1, ... , n} of each
G h E 9 and let it enter the likelihood (12). In this way, we are modelling an
hypotheses set which contains the independence case (a = 0), the one latent
data case (a -=I- 0, and neighbourhood structure{ NI (i), : i = 1, ... ,n}), and in
general the k latent data case (a -=I- 0, and neighbourhood structure{Nk(i),: i =
1, ... ,n}), and finally the exchangeable hypothesis if we use the neighbourhood
structure of the graph G n - l ~ G n . Playing this role, the family 9 provide us
229
(17)
where I;n-l is square matrix obtained from I; after deleting the i-th row and
column. Clearly, the conditional independence graph for !(Yn-l) is G h - 1 •
Indeed, if we integrate N(O,~) with respect to an observation Yj' with the
vertex j not belonging to the intersection of the maximal cliques, we still
obtain a Gh-equivalent graph with n - 1 vertices.
In general, if we have the joint density of Y , corresponding to some
conditional independence graph G h E g, we may say that under Gaussian
distribution hypotheses, integrating the joint density of Y with respect to Yi
produces a marginal density corresponding to the subgraph obtained from G h
when one deletes the i-th vertex and the edges having i as an end point.
But the algebraic structure of G h changes only if the vertex i belongs to the
intersection of the maximal cliques of G h.
4 Estimation problems
(18)
(19)
230
(20)
The simplest procedure for solving (20), is the Gauss-Newton iterative method
(21)
where p is the step number, H(p) is information matrix whose (i, j)-elements
are
(22)
H(j2,a.
';4 J.r(y
(j - Xf3)'D(y - Xf3)
2 1 (24)
- [ ';4 (y - Xf3)' D(y - Xf3) tr [(I - A(a))-l D]
(26)
But the Gersgoring disk (Magnus and Neudecker, 1988) of the maximum eigen-
value of Dis
(27)
231
hence
2
{0- > O} n { a < '\~ax} J 2
{0- > O} n {0 < a < n ~ 1} (28)
or, in other words, the region (25) is a subset of the admissibility region for
the parameters a and 0- 2 • Finally, the maximum likelihood estimate ij can be
used for defining the concentration ellipsoid
(29)
where H." is the information matrix evaluated at ." = ij and X%+2 is the
Chi-quared distribution with k + 2 degrees of freedom and corresponding to a
significance level chosen.
5 Conclusion
Acknowledgments
This paper was supported by the MURST Research Group 1993 "Analisi dei
dati dipendenti ".
References
Cressie, N. , 1991. Statistics for Spatial Data. J. Wiley & Sons, New York.
A. BELLACICCO
Dipartimento di Teoria dei Sistemi e delle Oryanizzazioni.
Universitd di Temmo
v. TULLI
Dipartimento di Metodi Quantitativi. Facoltd di Economia
Universitd di Brescia.
In the last years a number of clustering algorithms were presented. Clustering al-
gorithms can be characterized considering a set of choices regarding the constraints
and the objective function. Generally speaking we can imbed any clustering algo-
rithm in the wide range of a graph transformation in terms of cuts and insertion
of arcs or edges in order to obtain a given topology of the subgraphs, like cliques
(a complete subgraph), circuits, arborescences and so on. The shape of a cluster
may be defined in terms of the corresponding topology and therefore can be char-
acterized by the highest eigenvalue of the graph associated matrix. In this paper
we will consider the characterization of clustering algorithms on graphs in terms of
eigenvalues. Real eigenvalues are related to balanced subgraphs, where the notion
of balanced graph will be considered.
1 Introduction
Let us consider a graph G (S, X), X ~ S x S, where S is a finite set of nodes rep-
resenting units, and X a finite set of arcs labelled with a spin value (+1,0, -1),
joining couples of nodes. We may consider both symmetric and antisymmetric
graphs. In particular a clique Kh,h is a symmetric graph whose cardinality is
h.
We can consider the notion of balanced graph in terms of a distance which
is based on the number of common ancestors of two nodes. We recall some
concepts from graph theory for defining the notion of balanced graph.
235
Definition 2 The dissimilarity d( Si, Sj) = dij between two nodes, Si and Sj,
ofG(S,X) is
(1)
where ni means the number of the nodes connected by an arc to Si and nij is
the number of nodes connected simultaneously, by an arc, to Si and Sj.
Balanced graph are studied in psychology and a simle example can be given
by considering groups of three people, where each individual may either like
or dislike each other. A general definition of a balanced subgraph is related to
graph circuits (cycles). A small group is balanced if each circuit is positive.
This definition implies that we can characterize a cluster of units, whether
236
or not they share some general property about the strength of the relation-
ships both for signed graphs and for the structure of the matrix of the values
associated to the arcs.
A first generalization may be obtained if we consider cliques rather than
circuits and the characterization of a cluster may be generalized without con-
sidering the amount of homogeneity to be maximized, but limiting ourselves
to the shape of the signed subgraph, in terms of properties to be satisfied.
We can consider now spin values on the arcs of a graph C( S, X) and review
the notion of cliques and balanced graphs. We call a graph with spin value on
the arcs as C*(S,X)..
Definition 5 A clique of a spin graph C*(S,X) is a clique whose arcs are
valued +1.
The truth of the previous statements on spin cliques can be easily checked if
we consider only the arcs with non negative values.
In order to generalize (1) we can consider the adjacency matrix whose
entries are the values dij of the arc connecting couples of nodes of C* (S, X).
The adjacency matrix M(C*) can be associated to the graph considering nt
the number of the arcs ingoing or outgoing from Si with values + 1, ni the
number of the arcs ingoing or outgoing from Si valued -1 and n?jO is the
number of arcs connecting the common neighbour of nodes of the mentioned
couple. The arcs valued 0 give a null contribution.
We introduce the new terms di,dj,dir
- + +n.-
·· -no
dtJ +n·J+ +n·J- - 2n··
+ - 2-
n·· (2)
t t tJ tJ
where
(3)
thus
~=~+~ W
Thus (2) is the distance formula.
In case of a spin clique Kh h it is obvious that d ij satisfies the same con-
ditions defining the notion of ;. dissimilarity index. We can also state that in
a clique both (1) and (2) are distance functions, whereas in the other cases
the triangular inequality does not hold. We can generalize the definition of a
balanced graph by the previous generalization on the adjacency matrix M (C*).
237
Proposition 2 Balanced subgraphs with spin values on the arcs own a con-
stant dissimilarity measure c4j for every couple of nodes.
The previous statement can be verified if we consider the matrix M (C).
We did not distinguish between ingoing arcs and outgoing arcs and equa-
tion (2) implies that the degrees of the nodes should have the same algebraic
summation of the arcs. Given any graph, a balanced subgraph may be obtained
by introducing a threshold function for each node, supposed to be obtained for
every node of C*(S,X). This notion of threshold function is quite new in
graph theory and the problem is to characterize each cluster in terms of bal-
anced subgraphs and an index which is strictly dependent from the degree of
balance of C*(S, X) (Roberts, 1976).
In the next paragraph we will consider the eigenvalues associated to a
graph C* (S, X) and we will see that balanced graphs BG have real eigenvalues
while unbalanced graphs could have complex eigenvalues. The transition from
balanced graphs to unbalanced graphs can be viewed as a sudden transition
in terms of eigenvalues. In other words, the transition from real eigenvalues to
complex eigenvalues is depending on a small change of the values associated
to the arcs.
D(C*) = ck (8)
As far as D(C*) is larger than ck, we have less than k clusters and the problem
is to isolate the clusters, if they exist.
We introduce now a concept which is quite new in the area of cluster
analysis.
Besides the notion of cluster in terms of balanced subgraph of a spin graph
C* (S, X), we consider the notation of inactive subgraph CO where
(9)
In this case the matrix M(CO) is asymmetric because for each couple of
nodes we have a couple of arcs with opposite values.
The three notions already introduced in this paper can be considered as
three different types of graphs. Considering the associated adjacence matrix a
sharp partition can be made between subgraphs whose associated matrix has
real eigenvalues and subgraphs having complex eigenvalues.
Actually, a symmetric matrix M(C') whose elements are non negative,
owns all real eigenvalues, and, in particular, the largest one is positive.
As a conseguence:
Theorem 1 The first eigenvalue of a clique adjacence matrix is positive.
Proof In fact, for every clique of a spin graph equation (5) holds and the
symmetry of the matrix associated to the clique is guarantee. 0
It is easy to see that in a clique the neighbours of all nodes are equal, and
therefore:
ni = nj and from (1)
dij = 2ni - 2nij = 2nj - 2nij
nij = ni = nj
and as a conseguence dd = O. In case a clique is inbedded in a graph, we have
to add the other nodes of the graph which are the neighbours of each node.
For a graph which is decomposable in a set of cliques, it is easy to see that d ij
has a constatnt value.
To both unbalanced subgraphs and inactive subgraphs of a spin graph
C* (S, X) asymmetric matrices are associated and the main eigenvalue can be
either negative or complex.
Some problems come up when there is just one arc connecting a couple of
nodes. In this case we can have some ambiguous results. In the next paragraph
239
we will consider some experiments on triangles which are the smallest cliques.
Recalling that every clique greater than a triangle can be reduced through a
covering by triangles, the problem to face is to consider the previous equations
when we have a superposition of triangles in a larger clique. We state the
following theorem:
Theorem 2 The Equation (5) is true when a clique Kh,h is covered by a set
of triangles, K 3 ,3.
Proof Let us consider a clique Kh,h and the set of the cliques K3,3 which
actually cover Kh,h. For each couple of nodes of each clique K3,3 equation
(2) holds. The numbers di and dj are equal, respectively, to nt and nj and
nt = nj = 4 = gi = gj where gi is the degree of the node Si and gj is the
degree of the node Sj. The degree of each vertex is equal to 2h - 2, where
h is the size of the clique Kh,h and the loop associated to the vertex is not
considered. The number nrJ is equal to 4h - 2. We get easily c = 2 when we
have two or more cliques with the same couple of vertices in common we have
to sum up the new degrees and we have to consider the new number n~. The
balance of equation (5) is untouched by adding new cliques covering the clique
Kh,h. The same arguments can be used both for balanced spin subgraphs and
for inactive spin subgraphs.
We consider here only three matrices which are able to show the truth of the
previous statements. The graph matrices and their largest eigenvalues are the
following ones:
240
(t t D Cli~ 3
U1I n Bala=d 3
11
( 0
_Ill ~1) Unbalanced -0.324
It is possible to build up easily the set of all matrices from the set of all
graphs composed by triangles and to evaluate their largest eigenvalue. We can
see that the shown examples are samples of this set.
Balanced graphs can be built like, for instance, the circuits and the cycles.
By examples considered we give a simple idea of the role of the maximum
eigenvalue corresponding to a clique, a balanced graph or an unbalanced graph,
respectively. In case of an unbalanced graph the maximum eigenvalue is neg-
ative, while for a clique and for a balanced graph the maximum eigenvalue is
a positive number.
We can observe that the clique and the balanced graph own the same
maximum eigenvector in spite of their different sizes. The common feature is
the presence of a set of circuits whose arcs are valued with the same weight,
which is non negative. In the unbalanced case the presences of a weight -1 is
sufficient for a sudden change of the value of the eigenvalue.
We may interpret easily the previous results and we may identify a clique
like a balanced graph. Moreover, the value of maximum eigenvalue can outline
whether the corresponding subgraph is a balanced graph. The identification
of the clusters in a graph implies the search for the square sub matrices having
the max/min eigenvalues positive and therefore the search may be reduced to
a sequence of reordering of rows and columns of the matrix associated to the
graph and to a sequence of cuts of edges (arcs) in order to isolate the balanced
graphs.
From the point of view of the interpretation of a balanced graph, we can
see that the absence of negative values besides the symmetry of the matrix
is a guarantee of the homogeneity of the subgraph elements, which is a basic
241
feature of a cluster.
Cluster identification as balanced subgraphs may consider both circuits
and cliques and some other types of graphs, like balanced graphs, which may
be interpreted as an homogenous group of units, like individuals in a sociogram
and elementary physical units in ferromagnetism. In a sociogram a balanced
graph means that all the individuals show a preference relationship toward the
other individuals and the topology of the graph is unessential. The presence of
the elements of the matrix with a value equal to zero forbids balance, as we can
see from the previous examples. Symmetry of the matrix associated to a graph
is an essential feature besides the absence of element whose value can be -l.
Such a type of good features can help for the search of sub matrices in a matrix
associated to a graph which satisfy the previous requirements. In this paper
we limited our observation to the simple fact that, in order to search suitable
submatrices, it is necessary a sequence of cuts of the edge (arcs) on the set of
edges with a negative weight. Our analysis was limited to the evaluation of
the maximum eigenvalue which can be described as a global index of balance.
We can see that this approach overcomes the usual way of treating cluster-
ing problem, mainly because we do not limit the study to non negative weights
on the arcs, an usual constraint in cluster analysis. The dissimilarity relation-
ship is generalized in terms of spin (spatial interaction) between a couple of
units in a graph.
Acknowledgments
References