Academia.eduAcademia.edu

First encounters on Bethe lattices and Cayley trees

Communications in Nonlinear Science and Numerical Simulation

In this work we consider the first encounter problems between a fixed and/or mobile target A and a moving trap B on Bethe Lattices and Cayley trees. The survival probability (SP) of the target A on the both kinds of structures are analyzed analytically and compared. On Bethe Lattices, the results show that the fixed target will still prolong its survival time, whereas, on Cayley trees, there are some initial positions where the target should move to prolong its survival time. The mean first encounter time (MFET) for mobile target A is evaluated numerically and compared with the mean first passage time (MFPT) for the fixed target A. Different initial settings are addressed and clear boundaries are obtained. These findings are helpful for optimizing the strategy to prolong the survival time of the target or to speed up the search process on Cayley trees, in relation to the target's movement and the initial position configuration of the two walkers. We also present a new method, which uses a small amount of memory, for simulating random walks on Cayley trees.

arXiv:2009.03496v1 [cond-mat.stat-mech] 8 Sep 2020 First encounters on Bethe Lattices and Cayley Trees Junhao Peng a,b Trifce Sandev c,d,e Ljupco Kocarev c,f a School of Math and Information Science, Guangzhou University, Guangzhou 510006, China. b Guangdong Provincial Key Laboratory co-sponsored by province and city of Information Security Technology, Guangzhou University, Guangzhou 510006, China. c Research Center for Computer Science and Information Technologies, Macedonian Academy of Sciences and Arts, Bul. Krste Misirkov 2, 1000 Skopje, Macedonia. d Institute of Physics & Astronomy, University of Potsdam, D-14776 Potsdam-Golm, Germany. e Institute of Physics, Faculty of Natural Sciences and Mathematics, Ss. Cyril and Methodius University, Arhimedova 3, 1000 Skopje, Macedonia. f Faculty of Computer Science and Engineering, Ss. Cyril and Methodius University, P.O. Box 393, 1000 Skopje, Macedonia Abstract In this work we consider the first encounter problems between a fixed and/or mobile target A and a moving trap B on Bethe Lattices and Cayley trees. The survival probability (SP) of the target A on the both kinds of structures are analyzed analytically and compared. On Bethe Lattices, the results show that the fixed target will still prolong its survival time, whereas, on Cayley trees, there are some initial positions where the target should move to prolong its survival time. The mean first encounter time (MFET) for mobile target A is evaluated numerically and compared with the mean first passage time (MFPT) for the fixed target A. Different initial settings are addressed and clear boundaries are obtained. These findings are helpful for optimizing the strategy to prolong the survival time of the target or to speed up the search process on Cayley trees, in relation to the target’s movement and the initial position configuration of the two walkers. We also present a new method, which uses a small amount of memory, for simulating random walks on Cayley trees. Key words: Random walks, survival probability, mean first encounter time, Cayley trees PACS: 05.40.Fb, 05.60.Cd Preprint submitted to Elsevier 9 September 2020 1 Introduction Encounters between target A and a moving trap B on appropriate structures have wide applications in target search [1–5] and prey-predator models [6]. Related researches often focus on the survival probability of the target and the mean first encounter time (MFET) between the walkers [7–15]. By comparing the survival probability (SP) or the MFET for a mobile target with SP or the mean first-passage time (MFPT) for immobile target, one can find the effect of the target’s move on the search efficiency. In general, the survival probability of a mobile target is less than or equal to the SP of an immobile target in the presence of randomly moving traps [16–19]. In other words, the move of the target would speed up the encounter between the target and the moving traps. This argument is also known as “Pascal principle”. However, the argument is just proved on d-dimension lattice [16,20] and there are also some different findings. Recent results show, if two walkers start from the same site and the initial position is randomly drawn from the stationary distribution, the move of the target A has no effect on the MFET on finite non-bipartite connected graphs, and the move of the target A fastens the encounter between the two walkers on finite bipartite connected graphs [21]. On infinite comb, researchers find different results [14, 22–24], i.e., the ultimate SP for a mobile target is greater than the ultimate SP for an immobile target in the presence of a randomly moving trap. On finite comb, the move of the target A can speed up the encounter process on some initial position settings, and the move of the target A can also slow the encounter process on some other initial position settings [21, 25, 26]. Therefore, one can optimize the search strategy in respect to the target movement and the initial position configuration. Bethe Lattices are infinite trees with same degree of all vertexes, and Cayley trees are finite trees with same degree of all non-leaf vertexes. Cayley trees can also be looked as Bethe Lattices confined in finite environments. Random walks and encounters on Bethe Lattices and Cayley trees have attracted lots of attention, and there are results for immobile target A [27–30]. Random walks on Bethe Lattices are non-recurrent, whereas random walks on Cayley trees are recurrent. What is the effect of target’s motion on the encounter for two particles walking on Bethe Lattices and Cayley trees? What is the difference between encounters on Bethe Lattices and those on Cayley trees? Are Bethe Lattices thermodynamic limit of Cayley trees? They are interesting problems Email addresses: pengjh@gzhu.edu.cn (Junhao Peng), trifce.sandev@manu.edu.mk (Trifce Sandev). 2 which are unsolved. In this paper, we focus on encounters between two walkers (i.e., target A and trap B) performing simple random walk on Bethe Lattices and Cayley trees. On Bethe Lattices, there is a probability that the two walkers will never encounter and there is a nonzero probability that the target will survive forever. We will consider the SP of a randomly moving target A in the presence of randomly moving trap B and compare it with the SP for immobile target A. On the finite Cayley tree structure, the two walkers will encounter in any case whether the target A is mobile or not. In addition to the analysis of SP for the target A, we also evaluate the MFET and compare it with MFPT. Here we address the MFET numerically and different initial position settings are considered. Note that shortage of memory is a common difficult for simulating random walk on graph with large size N. Here we introduce a new method which just need O(log(N)) memory units. Therefore, the difficulties in memory shortage for numerical simulation are solved. This paper is organized as follows. In Sec. 2 we describe the topology of Bethe lattices and Cayley trees. Next, in Sec. 3, we analyze analytically the SP for the target A on Bethe Lattices and Cayley trees. In Sec. 4, the MFET for mobile target A is evaluated numerically and compared it with the MFPT for immobile target A. Finally, conclusions and discussions are provided in Sec. 5. 2 The network structure Both, the Bethe lattice and Cayley tree, are simple connected undirected graphs G = (V, E) (V represents the set of vertices and E represents the set of edges) with no cycles, and they both are trees. The Bethe lattice, denoted by BLm , is an infinite tree with same degree m (m ≥ 3) of all vertices, where m is called a coordination number. Actually, the Bethe Lattice is an unrooted tree, since any vertex will serve equally well as a root. The Cayley tree is rooted, all other nodes are arranged in shells around its root vertex [27, 28], and each non-terminal vertex is connected to m (m ≥ 3) neighbors. A Cayley tree with coordination number m and g (g ≥ 0) shells, Cm,g , is defined in the following way. We link the root vertex O with m new vertices by means of m edges. The first set of m nodes constitutes the shell k = 1 of Cm,g . Then, to build the shell k (2 ≤ k ≤ g), each vertex of the shell k − 1 is linked to m − 1 new vertices. The set of these new vertices constitutes the shell k of Cm,g . FIG. 1 shows the construction of the Cayley tree C4,3 . Therefore, the vertices in the last shell g have degree dg = 1, and all vertices in other shells have degree dk = m (k = 0, 1, · · · , g − 1) (the shell k = 0 represents the single root vertex O). The number of nodes of the shell k (k = 1, 2, · · · , g) is Nk = m(m − 1)k−1 , 3 Fig. 1. Structure for a particular Cayley tree C4,3 . Vertices colored with green belong to the first shell, with red to the second shell, and with blue to the third shell of C4,3 . while the total number of nodes and total number of edges in Cm,g read N = |V | = m(m − 1)g − 2 , m−2 (1) m(m − 1)g − m , (2) m−2 respectively. The main difference between Bethe Lattice and Cayley tree is the fact that Bethe Lattice is infinite while Cayley tree finite, and Cm,g can be considered as BLm confined in finite environments. All vertexes of BLm are equivalent, whereas vertexes of Cm,g are divided into g + 1 shells: the vertexes in different shells are not equivalent, while the vertexes in a same shell of Cm,g are equivalent. In this paper, an arbitrary vertex in shell k of Cm,g is denoted by vk (k = 0, 1, . . . , g). |E| = N − 1 = 3 Survival probability Let us consider target A and a moving trap B on Bethe Lattice or Cayley tree. The survival probability (SP) up to time t for the target A is defined by S(t) = 1 − t X F (s), (3) s=1 where F (t) is the first encounter probability (FEP), i.e., the probability that the two players arrive at the same site for the first time at time t. In order to find the effect of the target’s movement on SP, we analyze FEP and SP, distinguishing between the cases with fixed and mobile target. 4 3.1 Survival probability on Bethe Lattices First we consider SP for a target A in the presence of a moving trap B on Bethe Lattice Bm . Note that all vertexes of Bm are equivalent. The SP for the target A is subject to the structure parameter m of Bethe Lattice and the initial distance L between the two walkers. Let FIm (t; m, L) and SIm (t; m, L) be the FEP and SP for immobile target, while FM (t; m, L) and SM (t; m, L) for mobile target, respectively. Let the target A is immobile, and let Xt be the distance between the two walkers at time t. Thus, we have X0 = L, and Xt+1 =    Xt  X + 1 with probability q = t − 1 with probability p = m−1 , m 1 , m (4) for any t ≥ 0, if Xt > 0. If Xt = 0, the two players encounter at time t and the game is over. Therefore, the first encounter processes for the two players on Bm can be mapped into the first passage processes for biased random walk on semiinfinite line, which is modeled by {Xt , t ≥ 0}, and F (t; m, L) ≡ P {Xt = 0}. Here P {Xt = 0} is the probability that the walker, starting from L, first reaches 0 at time t, on semi-infinite line. Recalling the result of P {Xt = 0} (e.g., see Ref. [31]), we have X FIm (t; m, L) = ( t 1 )L , m−1 and for any integer t (t ≥ L), FIm (t; m, L) =    0,   L t t < L, t (t+L)/2  p t+L 2 q t−L 2 (5) , t ≥ L, where the binomial coefficient is zero if t and L are not of the same parity. As for the case the two walkers are mobile, let Yt be the distance between the two walkers at time t. Thus, we have Y0 = L, and     Yt    + 2 w.p. Yt+1 =  Yt − 2 w.p.      Yt w.p. (m−1)2 , m2 1 , m2 (6) 2m−2 , m2 for any t > 0, if Yt > 0. If Yt = 0, the two players encounter at time t and the game is over. Therefore, the first encounter processes for the two walkers on Bm can be modeled by {Yt , t ≥ 0}, and FM (t; m, L) = P {Yt = 0}. 5 For a random walk, modeled by {Yt , t ≥ 0}), at any step there is a nonzero that the walker will stay in situ. Let k be the total number probability 2m−2 m2 of steps that the walker stay in situ, before it arrives at the site 0 at time t. Then for the rest t − k steps, the walker moves left or right and reach site 0 at the (t − k)-th step. If we ignore the k steps that the walker stay in situ, the process of other t − k steps is similar to {Xt , t ≥ 0}. The difference is in the (m−1)2 1 probability p = (m−1) 2 +1 (or q = (m−1)2 +1 ) that the walker moves to the left (or right), and here the walker jumps 2 units at each step. The probability that the walker reaches 0 at time t − k can be exactly addressed by using a similar formula to Eq. (5). If the walker for the first time arrives at site 0 at time t, then k steps that the walker stays in situ must happened in t − 1 steps before time t, and 0 ≤ k ≤ t − L/2, t − k and L/2 are of the same parity 1 . Note that the probability that the walker stays in situ for k times in t − 1 steps before time t, reads 2   2m − 2 k m − 2m + 2 n−k−1 pk = t−1 ( ) ( ) . k m2 m2 By using the whole probability formula, we get the FEP FM (t; m, L) = P {Yt = 0, Yn > 0, 0 < n < t} =   X k  1 L/2  t−k pk (t−k+L/2)/2  (m − 1)2 + 1  t−k 2 × (m − 1) (m − 1)2 + 1  ! t−k−L/2   2 ! t−k+L/2 2 , (7)   for mobile target, where the sum runs over all possible k ∈ {k : 0 ≤ k ≤ t − L/2, t − k and L/2 are of the same parity}. By comparing FIm (t; m, L) with FM (t; m, L), we find that both FIm (t; m, L) and FM (t; m, L) decay exponentially with t and the decay of FM (t; m, L) is faster than FIm (t; m, L) (see FIG. 2 (a) for m = 4 and L = 2). Inserting Eqs. (5) and (7) into Eq. (3), we obtain SIm (t; m, L) and SM (t; m, L). By comparing SIm (t; m, L) and SM (t; m, L), we find SIm (t; m, L) ≥ SM (t; m, L), 1 (8) If k > t − L/2, we get t − k < L/2, the walker starting from site L can not reach 0 in t − k steps and the probability that the walker reaches the site 0 at time t is 0. Similarly, if t − k and L/2 are not of the same parity, the walker starting from site L can not reach 0 in t − k steps as well. 6 100 0.94 F Im (t;4,2) 10 a) b) S Im (t;m,2) 0.93 F M(t;4,2) -5 S Im (t;m,2) 0.92 100 10-10 10-15 10 0.91 10-10 0.9 10-20 100 -20 0 101 20 0.89 102 40 60 80 100 0 t 20 40 60 80 100 t Fig. 2. (a) Plots of FIm (t; 4, 2) and FM (t; 4, 2) versus t. Data for FIm (t; 4, 2) and FM (t; 4, 2) are obtained by evaluating the exact expression (5) and(7). Both FIm (t; 4, 2) and FM (t; 4, 2) decay exponentially with t and the decay of FM (t; 4, 2) is faster than that of FIm (t; 4, 2). (b) Plots of SIm (t; m, 2) and SM (t; m, 2) as functions of t. Data for SIm (t; 4, 2) and SM (t; 4, 2) are obtained by inserting FIm (t; 4, 2) and FM (t; 4, 2) into Eq. (3). It shows SIm (t; m, L) ≥ SM (t; m, L) and lim SIm (t; m, L) = lim SM (t; m, L). t→∞ t→∞ and 1 )L , t→∞ t→∞ m−1 see FIG. 2 (b) for m = 4 and L = 2. Just as expected, “Pascal principle” holds on Bethe Lattices, where the random walk is non-recurrent. lim SIm (t; m, L) = lim SM (t; m, L) = 1 − ( 3.2 Survival probability on Cayley trees Next we consider SP for the target A in the presence of a moving trap B on Cayley tree Cm,g by means of numerical simulation. The FEP between the two walkers are also analyzed. Note that the initial positions of the two walkers have great effect on SP, and it is impossible to enumerate all the possible cases. In order to highlight the difference between SP on Bethe Lattice Bm and SP on Cayley tree Cm,g , similarly to the problem analyzed in Sec. 3.1, here we consider initial position of target A at the root of Cm,g and initial distance L between the two walkers. We also compare the SP of the target A for mobile target with the one for immobile target and disclose the effect of target’s move on its SP. As in Sec. 3.1, FIm (t; m, g, L) and SIm (t; m, g, L) denote the FEP and SP for immobile target, while FM (t; m, g, L) and SM (t; m, g, L) for mobile target, respectively. Contrary to the results on Bethe Lattice, we find that the decay of FIm (t; m, g, L) and FM (t; m, g, L) display three regimes with different speed, and the decays of FIm (t; m, g, L) and FM (t; m, g, L) are slower than the decay of FIm (t; m, L) and FM (t; m, L) (see FIG. 3 (a) for m = 4, g = 7, L = 2). For initial position of the target A at the root of Cayley tree Cm,g , we find SIm (t; m, g, L) ≤ SM (t; m, g, L), 7 (9) 100 (b) S M(t;4,7, 6) S Im (t;4,7, 6) 10-2 S M(t;4,7, 2) S Im (t;4,7,2) 10-4 10-6 10-8 0 1 2 3 t 4 105 Fig. 3. (a) Plot of FIm (t; 4, 7, 2) and FM (t; 4, 7, 2) versus time t. The decay of FIm (t; 4, 7, 2) and FM (t; 4, 7, 2) displays three regimes with different speed. The decays of FIm (t; 4, 7, 2) and FM (t; 4, 7, 2) are slower than those of FIm (t; 4, 2) and FM (t; 4, 2), as shown in FIG 2 panel (a); (b) Plot of SIm (t; m, g, L) and SM (t; m, g, L) as function of t for m = 4, g = 7, L = 2 and m = 4, g = 7, L = 6. For both cases, both SIm (t; m, g, L) and SM (t; m, g, L) decay exponentially with t, and the decay of SIm (t; m, g, L) is faster than that of SM (t; m, g, L), i.e., SIm (t; m, g, L) ≤ SM (t; m, g, L), which is not consistent with “Pascal principle”. The data shown here have been obtained via numerical simulations and the sample, for each case, contains 107 realizations. which is opposite to the result on Bethe Lattice, as shown in Eq. (8), and is not consistent with the “Pascal principle”. Therefore, in this sense, we cannot look on Bethe Lattices as the thermodynamic limit of Cayley trees. FIG. 3 (b) shows the plot of SIm (t; m, g, L) and SM (t; m, g, L) as functions of t for m = 4, g = 7, L = 2 and for m = 4, g = 7, L = 6. Furthermore, Eq. (9) is robust and it also holds for initial position of the target A close to the root of the Cayley tree. 4 MFET and MFPT for two walkers on Cayley trees In what follows, the mean first encounter time (MFET) and some related quantities for two particles walking on Cayley trees, are evaluated and compared with corresponding quantities of mean first-passage time (MFPT) while one of the two particles is fixed. Different initial settings are considered. Here, the MFET is obtained by means of numerical simulation. 4.1 Definitions and method for numerical simulation For two walkers, A and B, performing simple random walk on Cayley tree Cm,g , the MFET between two walkers, MFET(iA ,iB ) , is the mean time it takes the two walkers to be on the same site for the first time, after they leave their initial position (iA , iB ). For immobile target A, the MFET recovers the 8 MFPT, MFPT(iA ,iB ) , which is the mean time it takes the walker B starting from iB reaches iA for the first time. In order to get more synthetic information, one should analyze the global-mean first-encounter time (GFET), defined by GFET := X X πiA πiB MFET(iA ,iB ) . (10) iA ∈V iB ∈V where πk = dk / P i di , and dk is the degree of the arbitrary vertex k. To find the effect of target’s initial position iA on GFET, one can also consider GFET for fixed iA , defined by GFETiA := X πiB MFET(iA ,iB ) . (11) iB ∈V For fixed target A, GFET recovers the global-mean first-passage time (GFPT), defined by X X GFPT := πiA πiB MFPT(iA ,iB ) , (12) iA ∈V iB ∈V and GFPTiA := X πiB MFPT(iA ,iB ) . (13) iB ∈V In order to simulate a random walk on graph, the method for labeling all the vertexes and links of the graph is employed [32, 33], and the use of adjacency matrix is a common choice. However, it needs huge memory units when the size of the graph is large. As an alternative of adjacency matrix representation of the Cayley tree, here we introduce a new method, where the vertexes of Cayley tree Cm,g are labeled by integers with base m, and the links between the vertexes can be found in the labels of the vertexes. Labeling of the vertexes. First, we label the root of the Cayley tree by integer 0. Then, for any other vertex of Cayley tree Cm,g , it must be a vertex, denoted by vk , in shell k (k = 1, 2, . . . , g), and there is an unique path {v0 , v1 , v2 , . . . , vk } from the root v0 to the vertex vk . Therefore, we can label the vertex by the unique path. The method is as follows. For any non-leaf vertex of Cayley tree Cm,g , we label its children sequentially with integers starting from 1. Then the path {v0 , v1 , v2 , . . . , vk } (and vertex vk ) can be labeled by a sequence {i1 , i2 , . . . , ik }, where ij represents the label of vj as a child of vj−1 . It is easy to find that the vertex labeled by {i1 , i2 , . . . , ik } is a child of vertex {i1 , i2 , . . . , ik−1 } and there is a link between them. Note that the root of Cayley tree Cm,g has m children vertexes, and all other non-leaf vertexes have m − 1 children vertexes. We have 1 ≤ i1 ≤ m and 1 ≤ ij ≤ m − 1 for j > 1. Therefore, the sequence {i1 , i2 , . . . , ik } can be represented by an integer with 9 base m, which is equal to kj=1 (ij × mk−j ). Any vertex of Cayley tree Cm,g can be labeled by an integer with base m. The label of its parents vertex can be obtained by removing the lowest bit of the integer, and its child vertex can be obtained by adding one more bit after the lowest bit of the integer. P Simulation of random walk. For two walkers walking on Cm,g , we introduce two integers with base m, pA and pB , to represent the current positions for the walkers. pA and pB change at every step. We remove the lowest bit of the integer when the walker moves to its parents vertex and we add one more bit after the lowest bit of the integer when the walker moves to one of its children vertexes. If pA = pB , encounter happens and the process ends. The total number of bits of both integers increases with the increase of the size N, and we should replace the two integers by two integer arrays when size N is huge. However, we just need O(log(N)) memory units. By comparing with the adjacency matrix, which needs O(N 2 ) memory units, the memory requirements of our method are negligible, and the difficulties for memory shortage are solved. We note that the method presented here can also be used on other regular hierarchical networks. 4.2 Walkers starting from a same site Next, we consider a system of two walkers initially set at the same site (iA = iB ), distinguishing between the cases with fixed and mobile target. Note that all nodes in the same shell of Cm,g are equivalent and Cm,g has just g + 1 different shells. There are only g + 1 different settings for the initial position of the two walkers. We analyze the MFET for iA = iB = vk , MFETiA =iB =vk , where vk represents an arbitrary vertex in the shell k (k = 0, 1, 2, ...g), and compare MFETiA =iB =vk with MFPTiA =iB =vk , where MFPTiA =iB =vk is the MFPT for iA = iB = vk . We analyze MFETiA =iB =vk (k = 0, 1, 2, ...g) by means of numerical simulation, and disclose the relation between MFETiA =iB =vk and system size N. If iA = iB = vg (i.e., both walkers start from a leaf vertex of Cm,g ), it follows that MFETiA =iB =vg = 1. If iA = iB = vg−1 , as shown in FIG. 4 (b), MFETiA =iB =vg−1 /N is almost a constant as N increases, and MFETiA =iB =vg−1 scales linearly with the size N. Therefore, we get MFETiA =iB =vg−1 ∼ N. (14) If iA = iB = v0 (i.e., both particles start from the root of Cm,g ), as shown in FIG. 4 (a), MFETiA =iB =v0 /N increases with N, MFETiA =iB =v0 /g/N is almost a constant as N increases, and MFETiA =iB =v0 /g increases linearly with N. 10 104 20 MFETi =i =v /N A B 0 2 (a) MFETi =i =v A B 0 10 (b) 0.2 1.5 0.1 0 MFETi =i =v /N/g A B 0 15 106 105 1 107 5 5 MFETi =i =v A B g-1 0.5 0 104 0 0 1 2 N 3 MFETi =i =v /N A B g-1 106 4 0 2 4 105 6 8 N 10 106 Fig. 4. (a) Main plot: plot of MFETiA =iB =v0 /g versus N on Cayley trees with different size (i.e., C4,g , g = 6, 7, . . . , 10). MFETiA =iB =v0 /g scales linearly with N . Inset plot: MFETiA =iB =v0 /g/N and MFETiA =iB =v0 /N versus N . MFETiA =iB =v0 /N increases with N , MFETiA =iB =v0 /g/N is almost a constant as N increases. (b) Main plot: plot of MFETiA =iB =vg−1 versus N on Cayley trees with different size (i.e., C4,g , g = 6, 7, . . . , 10). MFETiA =iB =vg−1 scales linearly with N . Inset plot: MFETiA =iB =vg−1 /N versus N . MFETiA =iB =vg−1 /N is almost a constant as N increases. The data shown here has been obtained via numerical simulations and, for every g, the sample contains 107 realizations. Therefore, we can state MFETiA =iB =v0 ∼ gN ∼ Nlog(N). (15) In order to find the relation between MFETiA =iB =vk and N for all possible starting sites vk (k = 1, 2, . . . , g − 2), we also analyze the relation between MFETiA =iB =vk with k on Cm,g . We find that MFETiA =iB =vk /N decreases linearly with the increase of k (see FIG. 5 (a) for the results on C3,9 , C3,10 , C4,9 and C4,10 ), and (MFETiA =iB =vk /N)/(g − k − 1) is almost a constant as k increases (see FIG. 5 (b) for the results on C3,9 , C3,10 , C4,9 and C4,10 ). Therefore, MFETiA =iB =vk ∼ (g − k − 1)N (k = 1, 2, . . . , g − 2). Recalling the scaling of MFETiA =iB =vg−1 and MFETiA =iB =v0 , as shown in Eqs. (14) and (15), we obtain MFETiA =iB =vk ∼ (g − k)N, (16) for k = 0, 1, 2, . . . , g − 1. Let us now consider the MFPT in the case where one of the two particles is immobile and fixed at a given vertex vk , while the other one is allowed to perform a random walk starting from the same site. In this case, the MFPT corresponds to the first return time of the mobile particle. Thus, one finds, see Ref. [34], MFPTiA =iB =vk    g 2[m(m−1) −m] , k = g, 2|E| (m−2) = = g  dk  2[m(m−1) −m] , k < g. m(m−2) 11 (17) 8 2 MFETi =i =v /N/(g-k-1) A B k C(3,10) MFETi =i =v /N A B k 6 C(4,10) 4 C(3,9) 1.5 C(4,9) (b) C(3,10) (a) C(3,9) C(4,10) C(4,9) 1 2 0.5 0 0 0 2 4 6 8 10 0 2 k 4 6 8 k Fig. 5. (a) Plot of MFETiA =iB =vk /N versus k (k = 0, 1, 2, . . . , g − 1) on C3,9 , C3,10 , C4,9 and C4,10 . MFETiA =iB =vk /N decreases linearly as k increases; (b) Plot of (MFETiA =iB =vk /N )/(g − k − 1) versus k (k = 1, 2, . . . , g − 2) on C3,9 , C3,10 , C4,9 and C4,10 . (MFETiA =iB =vk /N )/(g − k − 1) is almost a constant as k increases. Therefore, MFETiA =iB =vk ∼ (g − k − 1)N . The data shown here have been obtained via numerical simulations and, for every k, the sample contains 107 realizations. Therefore MFPTiA =iB =vk ∼ N for all k (0 ≤ k ≤ g). In order to find the effect of the target’s move on the encounter between the two walkers, one should analyze the ratio between MFETiA =iB =vk and MFPTiA =iB =vk . On Cayley tree Cm,g , let R(k, m, g) ≡ MFETiA =iB =vk , MFPTiA =iB =vk (18) where m ≥ 3, g ≥ 1 and k = 0, 1, 2, . . . , g. Note that R(k, m, g) < 1 for k = g. For k < g, we find that R(k, m, g) monotonically increases with m (see FIG. 6 (c), but R(k, m, g) changes a little as m increases while k = g − 1, and R(k, m, g) decreases monotonically as k increases, see FIG. 6 (d). For m = 3, as shown in FIG. 6 (a), R(0, m, g) > R(g − 3, m, g) > 1 and R(g − 1, m, g) < R(g − 2, m, g) < 1. Note that R(k, m, g) decreases with k, and we can state    R(k, m, g)   R(k, m, g) < 1 if k ≥ g − 2, (19) > 1 if k ≤ g − 3. Similarly, for m = 4 (see FIG. 6 (b), we get     R(k, m, g)    R(k, m, g)       R(k, m, g) < 1 if k = g − 1, ≈ 1 if k = g − 2, > 1 if k ≤ g − 3. 12 (20) m 3 4 ≥5 k Encounter Times ≥g−2 MFETiA =iB =vk < MFPTiA =iB =vk ≤g−3 MFETiA =iB =vk > MFPTiA =iB =vk ≥g−1 MFETiA =iB =vk < MFPTiA =iB =vk g−2 MFETiA =iB =vk ≈ MFPTiA =iB =vk ≤g−3 MFETiA =iB =vk > MFPTiA =iB =vk ≥g−1 MFETiA =iB =vk < MFPTiA =iB =vk ≤g−2 MFETiA =iB =vk > MFPTiA =iB =vk Table 1 The comparison between the MFET and MFPT on Cm,g while iA = iB = vk , with m ≥ 3, g ≥ 3, and k = 0, 1, . . . , g. Recalling R(k, m, g) monotonically increases with m, for m ≥ 5, we get    R(k, m, g)   R(k, m, g) ≈ R(k, 4, g) < 1 if k = g − 1, (21) > R(k, 4, g) > 1 if k ≤ g − 2. All the results given by Eqs (19)-(21) are summarized in TABLE 1, which shows that MFETiA =iB =vk > MFPTiA =iB =vk for k ≤ g − 3, i.e., the move of the target A slows down the encounter if the two walkers start from a site which is not close to the leaf-vertex of the Cayley tree. It is quite different with the result in Ref [21], which shows, X k∈V X d2k d2k MFPT = 2 P 2 MFETiA =iB =vk , i =i =v A B k d2i di k∈V P (22) i.e., the move of the target A fastens the encounter if the same initial position of the two walkers are selected randomly. The reason is in the fact that there are so many leaf-vertexes in Cayley tree, where the move of target A fastens the encounter. 4.3 Walkers starting from different but fixed sites We consider the case where A and B start from arbitrary fixed sites iA and iB on Cm,g . We will analyze MFPT for immobile target A, and MFET for mobile target A. The MFPT is analyzed analytically based on the results obtained in our previous work [35], while the MFET is obtained numerically via simulations. Note that the initial position (iA , iB ) of the two walkers has great effect on MFPT and MFET. There are so many different choices of the 13 k=0 k=g-3 k=g-2 k=g-1 4 k=0 k=1 k=g-3 k=g-2 k=g-1 (a) 12 R(k,m,g) R(k,m,g) 6 m=3 2 10 8 6 m=4 4 1 2 1 0 0 6 7 8 9 10 6 g 8 10 10 (c) 6 m=3,g=10 m=4,g=10 R(k,m,g) 10 8 g k=0 k=1 k=g-2 k=g-1 12 R(k,m,g) (b) g=4 4 2 1 0 (d) 5 1 0 2 4 6 8 10 0 m 5 10 k Fig. 6. (a) R(k, m, g) versus g for m = 3 and different k (i.e., k = 0, g−3, g−2, g−1). For any g, R(0, m, g) > R(g − 3, m, g) > 1 and R(g − 1, m, g) < R(g − 2, m, g) < 1, which presents evidence to support Eq. (19); (b) R(k, m, g) versus g for m = 4 for different k (i.e., k = 0, 1, g − 3, g − 2, g − 1). For any g, R(0, m, g) > R(1, m, g) > R(g − 3, m, g) > 1, R(g − 2, m, g) ≈ 1 and R(g − 1, m, g) < 1; (c) R(k, m, g) as a function of m (m = 3, 4, . . . , 10) for g = 4 and different k (i.e., k = 0, 1, g − 2, g − 1). R(k, m, g) increases with m, but R(k, m, g) shows a little increase with m while k = g − 1. For g = 4, k = g − 1, R(k, m, g) < 1 for all m; for g = 4, k = g − 2, R(k, 3, g) < 1, R(k, 3, g) > 1 for any m > 3; for g = 4, k = 1 and g = 4, k = 0, R(k, m, g) > 1 for any m; (d) R(k, m, g) as a function of k (k = 0, 1, . . . , g − 1) for m = 3, g = 10 and m = 4, g = 10. R(k, m, g) decreases as k increases in both cases. In all four panels, R(k, m, g) is obtained by dividing the numerical estimate for MFETkiA =iB =vk by the exact evaluation of MFPTkiA =iB =vk from (17). For every (k, m, g), the sample of the simulation contains 107 realizations. pair (iA , iB ), and, thus, we can not enumerate all the possible choices. We just analyze the case with initial position of one of the walkers at the root. We analyze the MFPT from iB to iA , i.e., MFPT(iA ,iB ) . By exploiting the connection between MFPT and effective resistance (see, e.g., Ref. [21, 35, 36]), we get MFPT(iA ,iB ) = |E|(LiA ,iB + WiA − WiB ), (23) where Lx,y denotes the shortest-path length between vertex x and y, |E| = N − 1 is the total number of edges, and Wy is defined as Wy = X x∈V dx Lx,y . 2|E| 14 (24) Therefore, if (LiA ,iB + WiA − WiB ) ∼ const, MFPT(iA ,iB ) ∼ N, (25) and if (LiA ,iB + WiA − WiB ) ∼ g ∼ log(N), MFPT(iA ,iB ) ∼ Nlog(N). (26) In particular, if iA = v0 and iB = vk , (k 6= 0), one finds LiA ,iB = k, WiA −WiB = 1−k 2(m−1) −k+ m(m−2) − 2(m−1) (see Ref. [35]). Therefore, (LiA ,iB +WiA −WiB ) ∼ const, m(m−2) and for any k = 1, 2, . . . , g, MFPT(v0 ,vk ) ∼ N. (27) Contrary to this, if iB = v0 and iA = vk , , (k 6= 0), (LiA ,iB + WiA − WiB ) ≈ 2k, and for any k = 1, 2, . . . , g, MFPT(vk ,v0 ) ∼ Nk. (28) Particularly, MFPT(vg ,v0 ) ∼ Ng ∼ Nlog(N). Now we turn our analysis to MFET(iA ,iB ) , which is the MFET in case the two walkers start from two different sites iA , iB . Here we just analyze the cases while the initial position for one of the two walkers is at the root. For any even k, we get MFET(v0 ,vk ) = MFET(vk ,v0 ) ∼ Nlog(N), (29) by means of numerical simulation. Part of the results are shown in FIG. 7, which represent the numerical results for two walkers with a minimum distance (i.e., iA = v0 , iB = v2 ), and maximum distance (i.e., iA = v0 , iB = vmax , with max = g if g is even and max = g −1 if g is odd). As shown in FIG. 7 (a), both MFET(v0 ,v2 ) /g and MFET(v0 ,vmax ) /g increase linearly with the size N; and in panel (b), we find that both MFET(v0 ,v2 ) /N and MFET(v0 ,vmax ) /N increase as N increases, whereas both MFET(v0 ,v2 ) /g/N and MFET(v0 ,vmax ) /g/N are almost constant as N increases. Therefore, Eq, (29) holds while iB = v2 and iB = vmax . Note that MFET increases with the distance between the initial position of the two walkers. We can state that Eq. (29) holds for any even k. For odd k, the two walkers can not encounter for ever because Cayley tree is a bipartite graph. Comparing Eq. (27) and Eq. (29), as long as N is large enough, we find MFPT(v0 ,vk ) < MFET(v0 ,vk ) . (30) It has been checked by numerical results as shown in FIG. 8. We find that Eq. (30) is robust, and MFPT(iA ,iB ) < MFET(iA ,iB ) while iA is close to the 15 104 10 MFET(v 8 MFET(v 6 0 0 ,v max ,v ) ) 15 (a) /g MFET(v MFET(v /g 10 2 MFET(v MFET(v 4 0 0 0 0 ,v ,v max max ,v ) ) (b) /N /g/N ) /N 2 ,v ) /g/N 2 5 2 0 0 5 10 N 15 0 103 104 104 105 106 N Fig. 7. (a) MFET(v0 ,v2 ) /g and MFET(v0 ,vmax ) /g as function of N on Cayley trees with different size (i.e., Cm,g , g = 6, 7, . . . , 10). Both MFET(v0 ,v2 ) /g and MFET(v0 ,vmax ) /g increase linearly as N increases; (b) Plot of MFET(v0 ,v2 ) /N , MFET(v0 ,vmax ) /N , MFET(v0 ,v2 ) /g/N and MFET(v0 ,vmax ) /g/N versus N on Cayley trees with different size (i.e., Cm,g , g = 6, 7, . . . , 10). Both MFET(v0 ,v2 ) /N and MFET(v0 ,vmax ) /N increase with N , while both MFET(v0 ,v2 ) /g/N and MFET(v0 ,vmax ) /g/N are almost constant as N increases. The data shown here has been obtained via numerical simulations and, for every k, the sample contains 107 realizations. root of the Cayley trees (e.g. iA = v0 , v1 , v2 ). Therefore, the move of the target A slows down the encounter for a start site iA close to the root of the Cayley trees. Our numerical results also show that, see FIG. 8 MFPT(iA ,v0 ) > MFET(iA ,v0 ) , (31) while iA is close to the leaf-vertex of the Cayley trees (e.g. iA = vg−1 , vg ). Therefore, the move of the target A fastens the encounter for a start site close to the leaf-vertex of the Cayley trees. 4.4 One walker starting randomly Here, we consider the case where the initial position of the target A is fixed at iA , while the initial position of the trap B, iB , is random and drawn from stationary distribution. We will analyze the GFET, which is obtained by averaging the MFET over all possible iB , as defined in (11), and then compare the GFET with GFPT, as defined in (13). The GFET is obtained numerically for different choices of iA , while the GFPT is obtained by referring to our previous work [35]. Note that all nodes in the same shell of Cm,g are equivalent. There are only g + 1 different kinds of choices for the initial position of the target A. Let vk be an arbitrary vertex in the shell k (k = 0, 1, 2, . . . , g). We will analyze 16 10 R(v 8 R(v max 0 ,v 2.5 (a) ,v ) 105 max (b) MFPT(v ,v ) k 0 0 ) 6 4 2 MFPT(v ,v ) 0 k 1.5 MFET(v ,v .) 0 k 1 2 1 0 0.5 0 4 6 8 10 2 g Fig. 8. (a) The ratio R(vmax ,v0 ) = 4 6 8 k MFPT(vmax ,v0 ) MFET(vmax ,v0 ) and R(v0 ,vmax ) = MFPT(v0 ,vmax ) MFET(v0 ,vmax ) as function of g on Cayley trees Cm,g (m = 4, g = 4, 5, . . . , 10). Data for MFET are obtained via numerical simulations while for MFPT are obtained by evaluating the exact expression (23). Results show that R(vmax ,v0 ) > 1 and R(v0 ,vmax ) < 1 for all g, which confirm the correctness of Eqs. (30) and (31); (b) MFPT(v0 ,vk ) , MFPT(vk ,v0 ) and MFET(v0 ,vk ) versus k, and compared on Cayley tree C4,8 . Data for MFET(v0 ,vk ) are obtained via numerical simulations while for MFPT(v0 ,vk ) and MFPT(vk ,v0 ) are obtained by evaluating the exact expression (23). Results show that MFPT(v0 ,vk ) < MFET(v0 ,vk ) for all k, whereas MFPT(vk ,v0 ) > MFET(vk ,v0 ) = MFET(v0 ,vk ) for k ≥ 4. They all confirm the correctness of Eqs. (30) and (31). GFETiA =vk and GFPTiA =vk , which are GFET and GFPT while iA is fixed at vk , respectively. For GFPTiA =vk , we find that GFETiA =vk /g increases linearly with the size N, and GFETiA =vk /N increases as N increases, whereas GFETiA =vk /g/N is almost constant as N increases (see FIG. 9 for iA = v0 and iA = vg on Cayley trees Cm,g with m = 4, g = 6, 7, . . . , 10). Therefore, we can state that GFETiA =vk ∼ gN ∼ Nlog(N), (32) for k = 0, 1, 2, . . . , g. We also find, for any different i, j, GFETiA =vi ≈ GFETiA =vj , which means that the initial position iA has a little effect on GFETiA =vk (see FIG. 9, where the signs of GFETiA =v0 are overlapped with those of GFETiA =vg , with v0 and vg being two sites with largest difference), and we can look on GFETiA =vk as a quantity which is independent of k. As for GFPTiA =vk , for an immobile target A, Refs. [29, 35] shows that 17 104 10 20 (a) GFETi GFETi =v /g A 0 8 15 GFETi =v /g A g GFETi GFETi 6 10 4 GFETi A A A A =v =v =v =v (b) /g/N g /N g /g/N 0 /N 0 5 2 0 103 0 0 5 10 15 104 104 N 105 106 N Fig. 9. (a) Plot of GFETiA =vk /g (k = 0, g) versus N on Cayley trees Cm,g with m = 4, g = 6, 7, . . . , 10. Both GFETiA =v0 /g and GFETiA =vg /g increase linearly with N , and GFETiA =v0 /g ≈ GFETiA =vg /g, which means that the selection of iA has a little effect on GFETiA =vk ; (b) Plot of GFETiA =vk /N and GFETiA =vk /g/N (k = 0, g) versus N on Cayley trees Cm,g with m = 4, g = 6, 7, . . . , 10. Both GFETiA =v0 /N and GFETiA =vg /N increase with N , whereas GFETiA =v0 /g/N and GFETiA =vg /g/N are almost constant as N increases. The data shown here have been obtained via numerical simulations and, for every initial position iA , the sample contains 107 realizations. 2(m − 1) 2km − ] m − 2 (m − 2)2 4(m − 1)g−k+1 m(3m2 − 8m + 8) + − (m − 2)2 (m − 2)3 2(m − 1) + 4(m − 1)1−k ≈ 2kN − N, m(m − 2) GFPTiA =vk = (m − 1)g [ (33) for any k = 0, 1, 2, . . . , g. Therefore, GFPTiA =vk increases monotonically in respect to k, and the initial position of the target A has a great effect on the GFPT. Particularly, GFPTiA =vk ∼ N for k = 0, and GFPTiA =vk ∼ Nlog(N) for k = g. Hence, r(k, m, g) increases with k, where r(k, m, g) ≡ GFPTiA =vk GFETiA =vk (34) with m and g being parameters of the Cayley tree Cm,g . As shown in FIG. 10, we also find that r(k, m, g) decreases as m increases, see panel (a), and r( g−3 g−1 , m, g) ≥ 1 ≥ r( , m, g), 2 2 18 (35) k=(g-3)/2 k=(g-2)/2 k=(g-1)/2 1 (b) k=(g-3)/2 k=(g-2)/2 k=(g-1)/2 1.6 r(k,m,g) r(k,m,g) 1.5 1.8 (a) 1.4 m=3 1.2 g=5 1 0.5 5 10 15 5 10 m 1.6 1.5 r(k,m,g) r(k,m,g) k=(g-3)/2 k=(g-2)/2 k=(g-1)/2 (c) k=(g-3)/2 k=(g-2)/2 k=(g-1)/2 1.4 15 g 1.2 1 (d) 1 m=5 m=4 0.8 0.5 6 8 10 12 4 6 g 8 10 g g−2 g−1 Fig. 10. (a) r(k, m, g) versus m for g = 5 and different k (i.e., k = g−3 2 , 2 , 2 ). r(k, m, g) decreases as m increases and expression (35) holds. It also informs us that g−2 g−2 r( g−2 2 , m, g) > 1 while m = 3, r( 2 , m, g) ≈ 1 while m = 4, and r( 2 , m, g) < 1 while m ≥ 5, which give us an evidence to support of expression (39); (b)-(d) r(k, m, g) versus g for m = 3, m = 4, m = 5, and different choices of k, respectively. Expressions (35) and (39) hold for all considered cases. In all four panels, r(k, m, g) is obtained by dividing the exact evaluation of GFPTiA =vk from Eq. (33) by the numerical estimates for any GFETiA =vj , j = 0, 1, 2, . . . , g and, for every triple (k, m, g) the sample of the simulation contains 107 realizations. for any m and g, see panels (a)-(d) 2 . Therefore,    r(k, m, g)   r(k, m, g) , m, g) ≤ 1 if k ≤ ≤ r( g−3 2 g−3 , 2 ≥ r( g−1 , m, g) ≥ 1 if k ≥ 2 g−1 . 2 Thus, for any non-negative integer k, if k ≥ the encounter between the two walkers, g−1 , 2 (36) the move of target A fastens GFPTiA =vk ≥ GFETiA =vk ; (37) and if k ≤ g−3 , the move of the target A slows down the encounter between 2 the two walkers, GFPTiA =vk ≤ GFETiA =vk . (38) 2 Note that GFETiA =vk can be considered as a quantity which is independent of k and GFPTiA =vk can be exactly evaluated from Eq. (33) for any real k. If k is not an integer, r(k, m, g) can also be obtained by dividing the exact evaluation of GFPTiA =vk from Eq. (33) by the numerical estimates for any GFETiA =vj , j = 0, 1, 2, . . . , g, and then be used as a reference value. 19 As for k = g−2 , 2 from FIG. 10, we can find     >    Therefore, if k = g−2 2 1 if m = 3, g−2 r( , m, g) ≈ 1 if m = 4,  2      < 1 if m ≥ 5. (39) is a non-negative integer,     GFPTiA =vk    GFPTiA =vk       > GFETiA =vk if m = 3, ≈ GFETiA =vk if m = 4, (40) GFPTiA =vk < GFETiA =vk if m ≥ 5. 4.5 Walkers starting randomly For completeness, we analyze walkers starting from sites iA and iB drawn independently from the stationary distribution Π on a Cayley tree Cm,g . We analyze the GFET for a mobile target, and compare it with the GFPT for an immobile target. Note that the initial position iA has little effect on GFETiA =vk . We have GFET ≈ GFETiA =vk . Recalling Eq. (35), we get GFPTiA =v g−3 < GFET < GFPTiA =v g−1 , 2 (41) 2 where 3−g 2 GFPTiA =v g−1 m2 − 2 + 4(m − 1) ≈ gN − m2 − 2m GFPTiA =v g−3 3m2 − 4m + 4(m − 1) ≈ gN − m2 − 2m 2 N, and 2 5−g 2 N. Therefore, GFET ∼ Nlog(N). (42) The GFPT can be rewritten as, see Ref. [21] GFPT = |E| X y∈V dy Wy , 2|E| (43) 20 GFPT/GFET 5 4 3 2 104 106 N Fig. 11. The ratio GFPT/GFET, obtained by dividing the exact evaluation of GFPT from Eq. (45) by the numerical estimates for GFET, versus N . GFPT/GFET > 2 and GFPT/GFET approaches 2 as N → ∞. where [35] X y∈V 2m(2gm2 − 2m − 4gm − m2 + 2)(m − 1)2g dy Wy = 2|E| 2(m − 2)3 2|E|2 m(3m2 + 4m − 4)(m − 1)g − m3 + . 2(m − 2)3 2|E|2 (44) Therefore, 2m(2gm2 − m2 − 2m − 4gm + 2)(m − 1)2g 2|E|(m − 2)3 2 m(3m + 4m − 4)(m − 1)g − m3 + 2|E|(m − 2)3 m2 + 2m − 2 ≈ 2gN − N m2 − 2m ∼ Nlog(N). GFPT = (45) Comparing GFET and GFPT, as shown in Eqs. (41) and (45), we get GFPT > 2GFET, (46) and in the limit of large size, N → ∞ (see FIG. 11 for m = 4), GFPT → 2. GFET Therefore the move of target A fastens the encounter between A and B. 21 (47) 5 Conclusion Bethe Lattices are infinite regular trees with same degree of all vertexes, whereas Cayley trees are regular finite trees with same degree of all non-leaf vertexes. Bethe Lattices are often seen as the thermodynamic limit of Cayley trees. In this work we considered the first encounter problems between the target A (or a prey) and a moving trap B on Bethe Lattices and Cayley trees, distinguishing between the case with fixed and mobile target. The survival probability (SP) of the target A on both trees are evaluated. Results show, if we fix the distance between the two particles, whose initial positions are close to the root, the SP of a mobile target is less than or equal to the SP of an immobile target on Bethe Lattices, whereas the SP of a mobile target is greater than or equal to the SP of an immobile target on Cayley trees. Therefore, if the initial position of the pray is close to the root, in order to prolong survival time, on Bethe Lattices, it is better for the prey to stay still, whereas on Cayley trees – the prey should move. In this sense, we can not consider the Bethe Lattices as thermodynamic limit of Cayley trees. On Cayley trees, the MFET for a mobile target A is analyzed and compared with the MFPT for a fixed target A. Different initial position settings are considered and some interesting results are found. In general, if the initial position of the both particles are set randomly, the move of target A would, on average, speed up the encounter between them. However, if the initial position of target A is fixed at an arbitrary site in the shell k, and the initial position of the trap B is randomly drawn from the stationary distribution, two different results are observed. Namely, the move of the target A speeds up the encounter while k ≥ g−1 , whereas the move of the target A slows down 2 g−3 the encounter while k ≤ 2 . These findings would be helpful for prolonging the survival time of the target on Cayley trees. The target should move if its initial position is close to the root, but it should stay still if its initial position is close to the leaf-vertex. It is known, see Ref. [21], that the move of the target A would, on average, speed up the encounter, if the two walkers start from the same site on Cayley tree and if the same initial position of the two walkers are selected randomly. However, if we classify all the vertexes of Cayley tree Cm,g into different shells according to its distance from the root, and let the two walkers both start from the same site in shell k, we find that the argument just holds for k = g or k = g − 1, and for all the other cases where k = 0, 1, . . . , g − 3, the move of the target A slows down the encounter. If two friends, separating at a certain site in Cayley tree, want to meet again quickly, it is better one of the two friends to stay still if their initial position is not close to the leaf-vertex. All these findings would be helpful for optimizing the search process on regular branch structures in relation to the motion of the target and to the initial position setting of the target. The effect of the target’s move on the encounter time on other structures is an interesting topic 22 and worth for further analysis. Acknowledgment The authors are grateful to Elena Agliari for valuable suggestions. JHP is supported by the National Natural Science Foundation of China (Grant No. 61873069 and 61772147) and the National Key R&D Program of China (Grant No. 2018YFB0803604). TS was supported by the Alexander von Humboldt Foundation. References [1] J.-F. Rupprecht, O. Bénichou, R. Voituriez, Optimal search strategies of runand-tumble walks, Phys. Rev. E 94 (2016) 012117. [2] D. W. Sims, E. J. Southall, N. E. Humphries, G. C. Hays, Scaling laws of marine predator search behaviour, Nature 451 (2008) 1098–1102. [3] D. Volchenkov, Random walks and flights over connected graphs and complex networks, Commun. Nonlinear Sci. Numer. Simul. 16 (1) (2011) 21–55. [4] G. M. Viswanathan, S. V. Buldyrev, S. Havlin, M. G. E. da Luz, E. P. Raposo, H. E. Stanley, Optimizing the success of random searches, Nature 401 (1999) 911–914. [5] M. Magdziarz, T. Zorawik, Method of calculating densities for isotropic ballistic lévy walks, Commun. Nonlinear Sci. Numer. Simul. 48 (2017) 462 – 473. [6] A. Luca, Collective predation and escape strategies, Phys. Rev. Lett. 109 (11) (2012) 118104. [7] Z. Koza, H. Taitelbaum, Spatiotemporal properties of diffusive systems with a mobile imperfect trap, Phys. Rev. E 57 (1) (1998) 237–243. [8] F. L. Vot, C. Escudero, E. Abad, S. B. Yuste, Encounter-controlled coalescence and annihilation on a one-dimensional growing domain, Phys. Rev. E 98 (3). [9] P. J. Forrester, Probability of survival for vicious walkers near a cliff, J. Phys. A 22 (13) (1999) L609. [10] S. B. Yuste, G. Oshanin, K. Lindenberg, O. Benichou, J. Klafter, Survival probability of a particle in a sea of mobile traps: A tale of tails, Phys. Rev. E 78 (2008) 021105. [11] G. Oshanin, O. Vasilyev, P. L. Krapivsky, J. Klafter, Survival of an evasive prey, Proc. Natl. Acad. Sci. U.S.A. 106 (33) (2009) 13696–13701. 23 [12] A. Szabo, R. Zwanzig, N. Agmon, Diffusion-controlled reactions with mobile traps, Phys. Rev. Lett. 61 (21) (1988) 2496–2499. [13] G. Schehr, S. N. Majumdar, A. Comtet, P. J. Forrester, Reunion probability of n vicious walkers: Typical and large fluctuations for large n, J. Stat. Phys. 150 (3) (2013) 491–530. [14] R. Campari, D. Cassi, Random collisions on branched networks: how simultaneous diffusion prevents encounters in inhomogeneous structures, Phys. Rev. E 86 (1) (2012) 021110. [15] M. George, R. Patel, F. Bullo, The meeting time of multiple random walks, https://arxiv.org/abs/1806.08843v1 (2018). [16] M. Moreau, G. Oshanin, O. Bénichou, M. Coppey, Pascal principle for diffusioncontrolled trapping reactions, Phys. Rev. E 67 (2) (2003) 045104. [17] L.-C. Chen, R. F. Sun, The Pascal Principle for a Particle Among Sub-diffusive Mobile Traps, http://arxiv.org/abs/1203.1389v1 (2012). [18] V. Tejedor, M. Schad, O. Bénichou, R. Voituriez, R. Metzler, Encounter distribution of two random walkers on a finite one-dimensional interval, J. Phys. A 44 (39) (2011) 395005. [19] D. Holcman, I. Kupka, The probability of an encounter of two brownian particles before escape, J. Phys. A 42 (31) (2009) 1943–1953. [20] L.-C. Chen, R. F. Sun, A monotonicity result for the range of a perturbed random walk, J. Theor. Probab. 27 (3) (2014) 997–1010. [21] J. H. Peng, E. Agliari, First encounters on combs, Phys. Rev. E 100 (2019) 062310. [22] X. Chen, D. Chen, Some sufficient conditions for infinite collisions of simple random walks on a wedge comb, Electron. J. Probab. 16 (2011) 1341–1355. [23] O. Bénichou, P. Illien, G. Oshanin, A. Sarracino, R. Voituriez, Diffusion and subdiffusion of interacting particles on comblike structures, Phys. Rev. Lett. 115 (22) (2015) 220601. [24] D. Chen, W. Bei, F. Zhang, A note on the finite collision property of random walks, Statist. Prob. Lett. 78 (13) (2008) 1742–1747. [25] E. Agliari, A. Blumen, D. Cassi, Slow encounters of particle pairs in branched structures, Phys. Rev. E 89 (5) (2014) 052147. [26] E. Agliari, D. Cassi, L. Cattivelli, F. Sartori, Two-particle problem in comblike structures, Phys. Rev. E 93 (5) (2016) 052111. [27] M. Ostilli, Cayley trees and bethe lattices: A concise analysis for mathematicians and physicists, Physica A 391 (12) (2012) 3417 – 3423. [28] D. Cassi, Random walks on bethe lattices, Europhys. Lett. 9 (7) (1989) 627–631. 24 [29] B. Wu, Y. Lin, Z. Z. Zhang, G. R. Chen, Trapping in dendrimers and regular hyperbranched polymers, J. Chem Phys. 137 (4) (2012) 044903. [30] Y. Lin, Z. Z. Zhang, Influence of trap location on the efficiency of trapping in dendrimers and regular hyperbranched polymers, J. Chem Phys. 138 (9) (2013) 094905. [31] W. Feller, An Introduction to Probability Theory and its Applications Vol I (3rd edition), John Wiley Sons, Inc, New York-London-Sydney, 1968. [32] J. S. Liu, Monte Carlo Strategies in Scientific Computing, Springer-Verlag, New York, 2004. [33] F. Amdjadi, Numerical simulation of reaction¨cdiffusion equations on spherical domains, Commun. Nonlinear Sci. Numer. Simul. 13 (8) (2008) 1592 – 1595. [34] L. Lovász, Combinatorics: Paul Erdos Is Eighty, Keszthely, Hungary, 1993. [35] J. H. Peng, G. A. Xu, R. X. Shao, C. Lin, H. E. Stanley, Analysis of fluctuations in the first return times of random walks on regular branched networks, J. Chem Phys. 149 (2) (2018) 024903. [36] J. H. Peng, Mean trapping time for an arbitrary node on regular hyperbranched polymers, J. Stat. Mech. 2014 (12) (2014) P12018. 25